mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/08/29 18:50:52
This commit is contained in:
parent
3f72ffa1bb
commit
7ccfcc348f
73 changed files with 1325 additions and 227 deletions
|
@ -28,5 +28,35 @@
|
|||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 62456741,
|
||||
"name": "jboss-autopwn",
|
||||
"full_name": "gitcollect\/jboss-autopwn",
|
||||
"owner": {
|
||||
"login": "gitcollect",
|
||||
"id": 17906239,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4",
|
||||
"html_url": "https:\/\/github.com\/gitcollect"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gitcollect\/jboss-autopwn",
|
||||
"description": "JBoss Autopwn CVE-2010-0738 JBoss authentication bypass ",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-02T15:17:07Z",
|
||||
"updated_at": "2018-06-15T07:31:47Z",
|
||||
"pushed_at": "2016-04-03T09:57:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T18:59:28Z",
|
||||
"updated_at": "2023-08-27T04:55:07Z",
|
||||
"updated_at": "2023-08-29T14:58:50Z",
|
||||
"pushed_at": "2021-06-06T09:41:51Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 69224981,
|
||||
"name": "cve-2010-3333",
|
||||
"full_name": "whiteHat001\/cve-2010-3333",
|
||||
"owner": {
|
||||
"login": "whiteHat001",
|
||||
"id": 18191034,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18191034?v=4",
|
||||
"html_url": "https:\/\/github.com\/whiteHat001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whiteHat001\/cve-2010-3333",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-09-26T07:35:41Z",
|
||||
"updated_at": "2016-09-26T07:35:41Z",
|
||||
"pushed_at": "2016-09-26T08:19:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 524884923,
|
||||
"name": "CVE-2010-3333-reproduction",
|
||||
|
|
32
2010/CVE-2010-3904.json
Normal file
32
2010/CVE-2010-3904.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 37162047,
|
||||
"name": "-cve-2010-3904-report",
|
||||
"full_name": "redhatkaty\/-cve-2010-3904-report",
|
||||
"owner": {
|
||||
"login": "redhatkaty",
|
||||
"id": 5626053,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5626053?v=4",
|
||||
"html_url": "https:\/\/github.com\/redhatkaty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/redhatkaty\/-cve-2010-3904-report",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-06-09T22:27:23Z",
|
||||
"updated_at": "2016-09-04T16:50:01Z",
|
||||
"pushed_at": "2015-06-09T22:45:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-28T09:44:30Z",
|
||||
"updated_at": "2023-08-29T13:24:01Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1774,
|
||||
"watchers_count": 1774,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1774,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -2102,6 +2102,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -479,13 +479,13 @@
|
|||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"forks_count": 136,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"forks": 136,
|
||||
"watchers": 397,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -209,6 +209,41 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153643745,
|
||||
"name": "hunt-for-cve-2018-10933",
|
||||
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "marco-lancini",
|
||||
"id": 1472968,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
|
||||
"html_url": "https:\/\/github.com\/marco-lancini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T15:08:25Z",
|
||||
"updated_at": "2023-06-20T11:06:21Z",
|
||||
"pushed_at": "2018-10-18T15:11:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"elasticsearch",
|
||||
"exploit",
|
||||
"nmap",
|
||||
"pentesting"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153675108,
|
||||
"name": "cve-2018-10933",
|
||||
|
@ -393,6 +428,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 153975086,
|
||||
"name": "pythonprojects-CVE-2018-10933",
|
||||
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "shifa123",
|
||||
"id": 18241082,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
|
||||
"html_url": "https:\/\/github.com\/shifa123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-21T05:01:12Z",
|
||||
"updated_at": "2022-01-03T19:20:42Z",
|
||||
"pushed_at": "2018-10-21T05:13:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 154050332,
|
||||
"name": "CVE-2018-10933",
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -2914,10 +2914,10 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2023-08-22T20:33:05Z",
|
||||
"updated_at": "2023-08-29T14:30:29Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -2926,7 +2926,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 229,
|
||||
"watchers": 230,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
@ -3230,6 +3230,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 318113571,
|
||||
"name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"full_name": "DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"owner": {
|
||||
"login": "DeathStroke-source",
|
||||
"id": 23089257,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23089257?v=4",
|
||||
"html_url": "https:\/\/github.com\/DeathStroke-source"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"description": "Scan through given ip list",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-03T07:40:19Z",
|
||||
"updated_at": "2021-01-29T14:08:43Z",
|
||||
"pushed_at": "2019-05-22T22:32:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 330872202,
|
||||
"name": "CVE-2019-0708-EXP-Windows",
|
||||
|
|
32
2019/CVE-2019-1041.json
Normal file
32
2019/CVE-2019-1041.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 435284718,
|
||||
"name": "CVE-2019-1041",
|
||||
"full_name": "5l1v3r1\/CVE-2019-1041",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2019-1041",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-05T21:36:21Z",
|
||||
"updated_at": "2023-06-08T15:44:37Z",
|
||||
"pushed_at": "2019-09-17T15:53:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 231926488,
|
||||
"name": "CVE-2019-10758",
|
||||
"full_name": "lp008\/CVE-2019-10758",
|
||||
"owner": {
|
||||
"login": "lp008",
|
||||
"id": 11436275,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
|
||||
"html_url": "https:\/\/github.com\/lp008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-10758",
|
||||
"description": "CVE-2019-10758",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-05T14:05:56Z",
|
||||
"updated_at": "2021-12-05T21:57:04Z",
|
||||
"pushed_at": "2020-01-05T14:21:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -253,10 +253,10 @@
|
|||
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T11:09:06Z",
|
||||
"updated_at": "2023-07-24T06:04:12Z",
|
||||
"updated_at": "2023-08-29T18:04:23Z",
|
||||
"pushed_at": "2019-10-29T15:47:02Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 144,
|
||||
"watchers": 143,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
32
2019/CVE-2019-1215.json
Normal file
32
2019/CVE-2019-1215.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 232197518,
|
||||
"name": "CVE-2019-1215",
|
||||
"full_name": "bluefrostsecurity\/CVE-2019-1215",
|
||||
"owner": {
|
||||
"login": "bluefrostsecurity",
|
||||
"id": 4976074,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
|
||||
"html_url": "https:\/\/github.com\/bluefrostsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2019-1215",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-06T22:34:16Z",
|
||||
"updated_at": "2023-05-22T09:24:46Z",
|
||||
"pushed_at": "2020-01-07T14:29:45Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
32
2019/CVE-2019-13404.json
Normal file
32
2019/CVE-2019-13404.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231223198,
|
||||
"name": "CVE-2019-13404",
|
||||
"full_name": "alidnf\/CVE-2019-13404",
|
||||
"owner": {
|
||||
"login": "alidnf",
|
||||
"id": 54067374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54067374?v=4",
|
||||
"html_url": "https:\/\/github.com\/alidnf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alidnf\/CVE-2019-13404",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-01T14:00:55Z",
|
||||
"updated_at": "2022-11-24T11:11:19Z",
|
||||
"pushed_at": "2020-01-01T14:09:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2019/CVE-2019-13504.json
Normal file
32
2019/CVE-2019-13504.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 435291799,
|
||||
"name": "fuzzenv-exiv2",
|
||||
"full_name": "5l1v3r1\/fuzzenv-exiv2",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/fuzzenv-exiv2",
|
||||
"description": "https:\/\/fuzzit.dev\/2019\/07\/11\/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing\/",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-05T22:15:28Z",
|
||||
"updated_at": "2022-08-16T08:26:01Z",
|
||||
"pushed_at": "2019-09-08T12:59:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2019/CVE-2019-1385.json
Normal file
32
2019/CVE-2019-1385.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 269204367,
|
||||
"name": "CVE-2019-1385",
|
||||
"full_name": "0x413x4\/CVE-2019-1385",
|
||||
"owner": {
|
||||
"login": "0x413x4",
|
||||
"id": 11176964,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11176964?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x413x4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x413x4\/CVE-2019-1385",
|
||||
"description": "Enjoy hacking ;)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-03T22:06:49Z",
|
||||
"updated_at": "2020-07-15T19:44:52Z",
|
||||
"pushed_at": "2019-12-25T11:20:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -308,6 +308,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 258967892,
|
||||
"name": "sudo-vulnerability-CVE-2019-14287",
|
||||
"full_name": "axax002\/sudo-vulnerability-CVE-2019-14287",
|
||||
"owner": {
|
||||
"login": "axax002",
|
||||
"id": 55937601,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55937601?v=4",
|
||||
"html_url": "https:\/\/github.com\/axax002"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/axax002\/sudo-vulnerability-CVE-2019-14287",
|
||||
"description": "Sudo Vulnerability CVE-2019-14287",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-26T07:29:44Z",
|
||||
"updated_at": "2021-04-14T16:06:10Z",
|
||||
"pushed_at": "2019-12-04T07:25:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 263100309,
|
||||
"name": "Exploit-CVE-2019-14287",
|
||||
|
@ -672,6 +702,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 435340206,
|
||||
"name": "cve-2019-14287sudoexp",
|
||||
"full_name": "5l1v3r1\/cve-2019-14287sudoexp",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/cve-2019-14287sudoexp",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-06T02:50:12Z",
|
||||
"updated_at": "2021-12-06T02:50:13Z",
|
||||
"pushed_at": "2019-10-21T02:01:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 550531926,
|
||||
"name": "CVE-2019-14287",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-14314 - NextGEN Gallery 3.2.10 Authenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-31T09:54:06Z",
|
||||
"updated_at": "2023-05-12T00:48:18Z",
|
||||
"updated_at": "2023-08-29T17:43:30Z",
|
||||
"pushed_at": "2020-01-31T10:51:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2019/CVE-2019-15112.json
Normal file
32
2019/CVE-2019-15112.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 435339590,
|
||||
"name": "CVE-2019-15112",
|
||||
"full_name": "5l1v3r1\/CVE-2019-15112",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2019-15112",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-06T02:47:15Z",
|
||||
"updated_at": "2021-12-06T02:47:16Z",
|
||||
"pushed_at": "2019-08-25T06:03:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -209,6 +209,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 231220055,
|
||||
"name": "CVE-2019-16278",
|
||||
"full_name": "NHPT\/CVE-2019-16278",
|
||||
"owner": {
|
||||
"login": "NHPT",
|
||||
"id": 42366434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
|
||||
"html_url": "https:\/\/github.com\/NHPT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
|
||||
"description": "CVE-2019-16278:Nostromo Web服务器的RCE漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-01T13:28:40Z",
|
||||
"updated_at": "2023-01-31T11:26:23Z",
|
||||
"pushed_at": "2020-01-01T13:36:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 251251110,
|
||||
"name": "cve-2019-16278",
|
||||
|
|
32
2019/CVE-2019-17427.json
Normal file
32
2019/CVE-2019-17427.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231651324,
|
||||
"name": "CVE-2019-17427",
|
||||
"full_name": "RealLinkers\/CVE-2019-17427",
|
||||
"owner": {
|
||||
"login": "RealLinkers",
|
||||
"id": 22389074,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealLinkers"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-17427",
|
||||
"description": "CVE-2019-17427 Persistent XSS POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-03T19:25:54Z",
|
||||
"updated_at": "2021-07-17T15:56:02Z",
|
||||
"pushed_at": "2020-01-03T19:32:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-08-29T06:24:35Z",
|
||||
"updated_at": "2023-08-29T15:07:57Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3855,
|
||||
"watchers_count": 3855,
|
||||
"stargazers_count": 3856,
|
||||
"watchers_count": 3856,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1086,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1086,
|
||||
"watchers": 3855,
|
||||
"watchers": 3856,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
32
2019/CVE-2019-18890.json
Normal file
32
2019/CVE-2019-18890.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231370688,
|
||||
"name": "CVE-2019-18890",
|
||||
"full_name": "RealLinkers\/CVE-2019-18890",
|
||||
"owner": {
|
||||
"login": "RealLinkers",
|
||||
"id": 22389074,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealLinkers"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-18890",
|
||||
"description": "CVE-2019-18890 POC (Proof of Concept)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-02T11:44:47Z",
|
||||
"updated_at": "2023-07-19T22:07:24Z",
|
||||
"pushed_at": "2020-01-06T13:13:58Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2019/CVE-2019-19782.json
Normal file
32
2019/CVE-2019-19782.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 233213627,
|
||||
"name": "CVE-2019-19782",
|
||||
"full_name": "Underwood12\/CVE-2019-19782",
|
||||
"owner": {
|
||||
"login": "Underwood12",
|
||||
"id": 19386296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19386296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Underwood12"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Underwood12\/CVE-2019-19782",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T10:25:18Z",
|
||||
"updated_at": "2020-01-11T10:25:20Z",
|
||||
"pushed_at": "2020-01-10T05:12:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
62
2019/CVE-2019-20197.json
Normal file
62
2019/CVE-2019-20197.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 232512469,
|
||||
"name": "CVE-2019-20197",
|
||||
"full_name": "lp008\/CVE-2019-20197",
|
||||
"owner": {
|
||||
"login": "lp008",
|
||||
"id": 11436275,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
|
||||
"html_url": "https:\/\/github.com\/lp008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-20197",
|
||||
"description": "CVE-2019-20197",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-08T08:11:58Z",
|
||||
"updated_at": "2020-01-08T08:20:44Z",
|
||||
"pushed_at": "2020-01-08T08:19:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 232513269,
|
||||
"name": "CVE-2019-20197",
|
||||
"full_name": "jas502n\/CVE-2019-20197",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-20197",
|
||||
"description": "Nagios XI远程命令执行漏洞 <v5.6.9",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-08T08:16:30Z",
|
||||
"updated_at": "2023-02-28T01:21:42Z",
|
||||
"pushed_at": "2020-01-08T08:30:03Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2019/CVE-2019-20224.json
Normal file
32
2019/CVE-2019-20224.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 233055034,
|
||||
"name": "CVE-2019-20224",
|
||||
"full_name": "mhaskar\/CVE-2019-20224",
|
||||
"owner": {
|
||||
"login": "mhaskar",
|
||||
"id": 6861215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
|
||||
"html_url": "https:\/\/github.com\/mhaskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-20224",
|
||||
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T13:41:28Z",
|
||||
"updated_at": "2023-06-05T10:09:18Z",
|
||||
"pushed_at": "2020-01-10T13:42:12Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"forks_count": 136,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"forks": 136,
|
||||
"watchers": 397,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
32
2019/CVE-2019-5630.json
Normal file
32
2019/CVE-2019-5630.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 232403416,
|
||||
"name": "CVE-2019-5630",
|
||||
"full_name": "rbeede\/CVE-2019-5630",
|
||||
"owner": {
|
||||
"login": "rbeede",
|
||||
"id": 1429214,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1429214?v=4",
|
||||
"html_url": "https:\/\/github.com\/rbeede"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rbeede\/CVE-2019-5630",
|
||||
"description": "https:\/\/www.rodneybeede.com\/curriculum%20vitae\/bio.html",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-07T19:43:42Z",
|
||||
"updated_at": "2020-01-07T19:44:19Z",
|
||||
"pushed_at": "2020-01-07T19:44:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -514,6 +514,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 232528693,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "geropl\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "geropl",
|
||||
"id": 32448529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32448529?v=4",
|
||||
"html_url": "https:\/\/github.com\/geropl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geropl\/CVE-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-08T09:37:54Z",
|
||||
"updated_at": "2021-10-21T21:43:59Z",
|
||||
"pushed_at": "2020-01-08T10:28:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 238321546,
|
||||
"name": "CVE-2019-5736-Custom-Runtime",
|
||||
|
|
|
@ -77,11 +77,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-10-21T15:31:13Z",
|
||||
"updated_at": "2023-06-10T16:09:01Z",
|
||||
"pushed_at": "2023-03-29T12:25:16Z",
|
||||
"pushed_at": "2023-08-29T17:49:28Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"forks": 67,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
32
2019/CVE-2019-8601.json
Normal file
32
2019/CVE-2019-8601.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231278850,
|
||||
"name": "CVE-2019-8601",
|
||||
"full_name": "BadAccess11\/CVE-2019-8601",
|
||||
"owner": {
|
||||
"login": "BadAccess11",
|
||||
"id": 59069469,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59069469?v=4",
|
||||
"html_url": "https:\/\/github.com\/BadAccess11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BadAccess11\/CVE-2019-8601",
|
||||
"description": "Exploiting a patched vulnerability in JavaScriptCore",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-02T00:12:22Z",
|
||||
"updated_at": "2023-07-10T12:03:02Z",
|
||||
"pushed_at": "2020-01-02T00:13:22Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T04:52:47Z",
|
||||
"updated_at": "2022-04-04T04:54:20Z",
|
||||
"updated_at": "2023-08-29T14:53:10Z",
|
||||
"pushed_at": "2022-04-04T04:54:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T04:44:39Z",
|
||||
"updated_at": "2022-04-04T04:47:45Z",
|
||||
"updated_at": "2023-08-29T14:42:24Z",
|
||||
"pushed_at": "2022-04-04T04:48:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -154,6 +154,38 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 234191063,
|
||||
"name": "CurveBall",
|
||||
"full_name": "ly4k\/CurveBall",
|
||||
"owner": {
|
||||
"login": "ly4k",
|
||||
"id": 53348818,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
|
||||
"html_url": "https:\/\/github.com\/ly4k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ly4k\/CurveBall",
|
||||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2023-08-04T19:34:59Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 882,
|
||||
"watchers_count": 882,
|
||||
"has_discussions": false,
|
||||
"forks_count": 219,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-0601"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 219,
|
||||
"watchers": 882,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
{
|
||||
"id": 234192123,
|
||||
"name": "chainoffools",
|
||||
|
@ -283,6 +315,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 234442281,
|
||||
"name": "cve-2020-0601-utils",
|
||||
"full_name": "0xxon\/cve-2020-0601-utils",
|
||||
"owner": {
|
||||
"login": "0xxon",
|
||||
"id": 1538460,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xxon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
|
||||
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T01:02:52Z",
|
||||
"updated_at": "2021-12-05T20:30:51Z",
|
||||
"pushed_at": "2020-01-21T19:48:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 234574037,
|
||||
"name": "Windows10_Cumulative_Updates_PowerShell",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 236109748,
|
||||
"name": "CVE-2020-0674",
|
||||
"full_name": "5l1v3r1\/CVE-2020-0674",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0674",
|
||||
"description": "Info about CVE-2020-0674",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-25T01:08:08Z",
|
||||
"updated_at": "2022-11-09T23:02:59Z",
|
||||
"pushed_at": "2020-01-23T12:54:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 262167867,
|
||||
"name": "CVE-2020-0674-Exploit",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2023-08-28T06:52:52Z",
|
||||
"updated_at": "2023-08-29T14:58:34Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1635,
|
||||
"watchers_count": 1635,
|
||||
"stargazers_count": 1636,
|
||||
"watchers_count": 1636,
|
||||
"has_discussions": false,
|
||||
"forks_count": 361,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 361,
|
||||
"watchers": 1635,
|
||||
"watchers": 1636,
|
||||
"score": 0,
|
||||
"subscribers_count": 90
|
||||
},
|
||||
|
@ -170,10 +170,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2023-08-27T05:33:32Z",
|
||||
"updated_at": "2023-08-29T15:02:07Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 551,
|
||||
"watchers_count": 551,
|
||||
"stargazers_count": 554,
|
||||
"watchers_count": 554,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
|
@ -182,7 +182,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 551,
|
||||
"watchers": 554,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-08-29T06:24:35Z",
|
||||
"updated_at": "2023-08-29T15:07:57Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3855,
|
||||
"watchers_count": 3855,
|
||||
"stargazers_count": 3856,
|
||||
"watchers_count": 3856,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1086,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1086,
|
||||
"watchers": 3855,
|
||||
"watchers": 3856,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
38
2020/CVE-2020-1611.json
Normal file
38
2020/CVE-2020-1611.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"id": 235582404,
|
||||
"name": "CVE-2020-1611",
|
||||
"full_name": "Ibonok\/CVE-2020-1611",
|
||||
"owner": {
|
||||
"login": "Ibonok",
|
||||
"id": 37837775,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37837775?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ibonok"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2020-1611",
|
||||
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-22T13:45:21Z",
|
||||
"updated_at": "2022-12-18T15:46:11Z",
|
||||
"pushed_at": "2020-01-22T14:01:32Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-1611",
|
||||
"description",
|
||||
"juniper",
|
||||
"poc",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T12:51:46Z",
|
||||
"updated_at": "2022-04-13T12:54:24Z",
|
||||
"updated_at": "2023-08-29T15:54:45Z",
|
||||
"pushed_at": "2022-04-13T12:54:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T08:41:07Z",
|
||||
"updated_at": "2022-05-30T08:42:59Z",
|
||||
"updated_at": "2023-08-29T14:00:30Z",
|
||||
"pushed_at": "2022-05-30T08:43:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2023-08-29T07:20:13Z",
|
||||
"updated_at": "2023-08-29T18:17:38Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1733,
|
||||
"watchers_count": 1733,
|
||||
"stargazers_count": 1734,
|
||||
"watchers_count": 1734,
|
||||
"has_discussions": false,
|
||||
"forks_count": 589,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 589,
|
||||
"watchers": 1733,
|
||||
"watchers": 1734,
|
||||
"score": 0,
|
||||
"subscribers_count": 46
|
||||
},
|
||||
|
@ -306,13 +306,13 @@
|
|||
"stargazers_count": 935,
|
||||
"watchers_count": 935,
|
||||
"has_discussions": false,
|
||||
"forks_count": 228,
|
||||
"forks_count": 229,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 228,
|
||||
"forks": 229,
|
||||
"watchers": 935,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
|
|
|
@ -851,12 +851,12 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-29T07:40:34Z",
|
||||
"updated_at": "2023-08-29T15:33:43Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"stargazers_count": 1073,
|
||||
"watchers_count": 1073,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"forks_count": 135,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -869,8 +869,8 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 1072,
|
||||
"forks": 135,
|
||||
"watchers": 1073,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2023-08-21T07:01:08Z",
|
||||
"updated_at": "2023-08-29T16:00:31Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 244,
|
||||
"watchers": 245,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2023-06-29T11:03:40Z",
|
||||
"updated_at": "2023-08-29T16:03:43Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2023-08-28T05:07:23Z",
|
||||
"updated_at": "2023-08-29T14:35:59Z",
|
||||
"pushed_at": "2023-07-10T16:41:49Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 272,
|
||||
"watchers": 273,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T19:07:37Z",
|
||||
"updated_at": "2023-08-25T08:40:23Z",
|
||||
"updated_at": "2023-08-29T14:36:10Z",
|
||||
"pushed_at": "2022-03-08T15:37:34Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -1397,10 +1397,10 @@
|
|||
"description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T02:12:39Z",
|
||||
"updated_at": "2022-09-21T11:39:27Z",
|
||||
"updated_at": "2023-08-29T14:26:41Z",
|
||||
"pushed_at": "2021-10-12T07:27:09Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -1415,7 +1415,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-08-26T09:13:54Z",
|
||||
"updated_at": "2023-08-29T18:18:08Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 629,
|
||||
"watchers": 630,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-08-29T07:32:26Z",
|
||||
"updated_at": "2023-08-29T18:17:47Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1250,
|
||||
"watchers_count": 1250,
|
||||
"has_discussions": false,
|
||||
"forks_count": 318,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 318,
|
||||
"watchers": 1249,
|
||||
"watchers": 1250,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2023-08-24T08:24:08Z",
|
||||
"updated_at": "2023-08-29T14:33:35Z",
|
||||
"pushed_at": "2023-02-14T07:05:22Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 333,
|
||||
"watchers": 334,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -912,7 +912,7 @@
|
|||
"stargazers_count": 1632,
|
||||
"watchers_count": 1632,
|
||||
"has_discussions": false,
|
||||
"forks_count": 479,
|
||||
"forks_count": 480,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -923,7 +923,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 479,
|
||||
"forks": 480,
|
||||
"watchers": 1632,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
|
@ -5752,10 +5752,10 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2023-08-02T11:59:07Z",
|
||||
"updated_at": "2023-08-29T14:49:47Z",
|
||||
"pushed_at": "2022-12-27T17:57:19Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"has_discussions": true,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
|
@ -5773,7 +5773,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 438,
|
||||
"watchers": 437,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-1386 - Fusion Builder < 3.6.2 - Unauthenticated SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-05T01:46:41Z",
|
||||
"updated_at": "2023-07-27T02:06:13Z",
|
||||
"updated_at": "2023-08-29T14:28:02Z",
|
||||
"pushed_at": "2023-03-08T18:25:29Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Android kernel exploitation for CVE-2022-20409",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T22:42:50Z",
|
||||
"updated_at": "2023-08-28T20:52:20Z",
|
||||
"updated_at": "2023-08-29T18:24:43Z",
|
||||
"pushed_at": "2023-08-05T20:56:12Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 110,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -766,12 +766,12 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-29T07:40:34Z",
|
||||
"updated_at": "2023-08-29T15:33:43Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"stargazers_count": 1073,
|
||||
"watchers_count": 1073,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"forks_count": 135,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -784,8 +784,8 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 1072,
|
||||
"forks": 135,
|
||||
"watchers": 1073,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -294,10 +294,10 @@
|
|||
"description": "A loader for zimbra 2022 rce (cve-2022-27925)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-01T10:33:55Z",
|
||||
"updated_at": "2023-07-21T06:27:33Z",
|
||||
"updated_at": "2023-08-29T14:58:47Z",
|
||||
"pushed_at": "2022-10-25T14:20:58Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -312,7 +312,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2180,11 +2180,11 @@
|
|||
"html_url": "https:\/\/github.com\/winstxnhdw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/winstxnhdw\/CVE-2022-30190",
|
||||
"description": "Proof of concept for CVE-2022-30190 (Follina).",
|
||||
"description": "A proof of concept for CVE-2022-30190 (Follina).",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T16:12:57Z",
|
||||
"updated_at": "2022-10-14T15:09:48Z",
|
||||
"pushed_at": "2023-08-28T22:06:22Z",
|
||||
"updated_at": "2023-08-29T16:29:42Z",
|
||||
"pushed_at": "2023-08-29T16:30:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"unisoc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -581,13 +581,13 @@
|
|||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-08-28T15:33:28Z",
|
||||
"updated_at": "2023-08-29T16:31:31Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 829,
|
||||
"watchers_count": 829,
|
||||
"stargazers_count": 830,
|
||||
"watchers_count": 830,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 829,
|
||||
"watchers": 830,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-04-20T08:51:20Z",
|
||||
"updated_at": "2023-08-29T06:19:40Z",
|
||||
"updated_at": "2023-08-29T16:26:12Z",
|
||||
"pushed_at": "2023-04-20T08:52:29Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"has_discussions": false,
|
||||
"forks_count": 161,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"forks": 162,
|
||||
"watchers": 439,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-23924 (Dompdf - RCE) PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-01T18:21:23Z",
|
||||
"updated_at": "2023-05-13T02:06:18Z",
|
||||
"updated_at": "2023-08-29T18:10:11Z",
|
||||
"pushed_at": "2023-02-02T02:05:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-08-28T08:00:16Z",
|
||||
"updated_at": "2023-08-28T08:04:58Z",
|
||||
"pushed_at": "2023-08-28T08:57:38Z",
|
||||
"pushed_at": "2023-08-29T14:38:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -173,10 +173,10 @@
|
|||
"description": "Requests Baskets (CVE-2023-27163) and Mailtrail v0.53",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-05T09:32:00Z",
|
||||
"updated_at": "2023-08-05T09:37:36Z",
|
||||
"updated_at": "2023-08-29T14:51:35Z",
|
||||
"pushed_at": "2023-08-05T09:36:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -185,7 +185,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -313,35 +313,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 684617839,
|
||||
"name": "CVE-2023-27163",
|
||||
"full_name": "josephberger\/CVE-2023-27163",
|
||||
"owner": {
|
||||
"login": "josephberger",
|
||||
"id": 38740973,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38740973?v=4",
|
||||
"html_url": "https:\/\/github.com\/josephberger"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/josephberger\/CVE-2023-27163",
|
||||
"description": "PoC for 2023-27163 Maltrail v0.53",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-29T14:02:42Z",
|
||||
"updated_at": "2023-08-29T14:03:28Z",
|
||||
"pushed_at": "2023-08-29T14:03:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ] ",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-12T02:41:26Z",
|
||||
"updated_at": "2023-08-28T18:43:32Z",
|
||||
"updated_at": "2023-08-29T14:26:45Z",
|
||||
"pushed_at": "2023-07-14T21:47:59Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-25T13:25:10Z",
|
||||
"updated_at": "2023-08-24T11:52:30Z",
|
||||
"updated_at": "2023-08-29T18:19:26Z",
|
||||
"pushed_at": "2023-06-02T12:10:06Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 138,
|
||||
"watchers": 139,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -43,8 +43,8 @@
|
|||
"description": "Scan for GhostScript files affected to CVE-2023-36664",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-29T14:01:49Z",
|
||||
"updated_at": "2023-08-29T14:01:50Z",
|
||||
"pushed_at": "2023-08-29T14:01:50Z",
|
||||
"updated_at": "2023-08-29T14:06:12Z",
|
||||
"pushed_at": "2023-08-29T14:06:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T07:28:06Z",
|
||||
"updated_at": "2023-08-29T13:15:34Z",
|
||||
"updated_at": "2023-08-29T17:34:59Z",
|
||||
"pushed_at": "2023-08-25T09:38:05Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 39,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T12:07:40Z",
|
||||
"updated_at": "2023-08-29T10:01:08Z",
|
||||
"updated_at": "2023-08-29T17:13:07Z",
|
||||
"pushed_at": "2023-08-23T16:46:53Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T22:24:34Z",
|
||||
"updated_at": "2023-08-29T07:19:10Z",
|
||||
"updated_at": "2023-08-29T14:46:43Z",
|
||||
"pushed_at": "2023-08-25T00:30:01Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 117,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T00:30:16Z",
|
||||
"updated_at": "2023-08-29T11:45:11Z",
|
||||
"updated_at": "2023-08-29T15:32:32Z",
|
||||
"pushed_at": "2023-08-27T00:41:40Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,12 +43,12 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-08-29T14:00:25Z",
|
||||
"updated_at": "2023-08-29T18:39:27Z",
|
||||
"pushed_at": "2023-08-27T03:22:22Z",
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -58,8 +58,8 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 323,
|
||||
"forks": 50,
|
||||
"watchers": 349,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -137,12 +137,12 @@
|
|||
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T21:49:37Z",
|
||||
"updated_at": "2023-08-29T13:14:54Z",
|
||||
"updated_at": "2023-08-29T16:08:34Z",
|
||||
"pushed_at": "2023-08-27T22:17:56Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -155,8 +155,8 @@
|
|||
"winrar"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 49,
|
||||
"forks": 12,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -204,19 +204,19 @@
|
|||
"description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T08:56:16Z",
|
||||
"updated_at": "2023-08-29T13:15:41Z",
|
||||
"updated_at": "2023-08-29T14:18:42Z",
|
||||
"pushed_at": "2023-08-28T09:32:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -234,10 +234,10 @@
|
|||
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T14:48:22Z",
|
||||
"updated_at": "2023-08-29T12:12:04Z",
|
||||
"updated_at": "2023-08-29T15:07:14Z",
|
||||
"pushed_at": "2023-08-28T15:33:27Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -246,7 +246,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -369,5 +369,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 684673194,
|
||||
"name": "CVE-2023-38831-Exploit-and-Detection",
|
||||
"full_name": "MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
|
||||
"owner": {
|
||||
"login": "MortySecurity",
|
||||
"id": 6032062,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6032062?v=4",
|
||||
"html_url": "https:\/\/github.com\/MortySecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
|
||||
"description": "This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-29T16:12:20Z",
|
||||
"updated_at": "2023-08-29T16:16:01Z",
|
||||
"pushed_at": "2023-08-29T16:15:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
62
2023/CVE-2023-40477.json
Normal file
62
2023/CVE-2023-40477.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 684635082,
|
||||
"name": "Scan_WinRAR",
|
||||
"full_name": "winkler-winsen\/Scan_WinRAR",
|
||||
"owner": {
|
||||
"login": "winkler-winsen",
|
||||
"id": 43114182,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43114182?v=4",
|
||||
"html_url": "https:\/\/github.com\/winkler-winsen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/winkler-winsen\/Scan_WinRAR",
|
||||
"description": "Scan for WinRAR files affected to CVE-2023-40477",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-29T14:41:58Z",
|
||||
"updated_at": "2023-08-29T14:44:09Z",
|
||||
"pushed_at": "2023-08-29T14:44:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 684680824,
|
||||
"name": "Winrar-CVE-2023-40477-POC",
|
||||
"full_name": "wildptr-io\/Winrar-CVE-2023-40477-POC",
|
||||
"owner": {
|
||||
"login": "wildptr-io",
|
||||
"id": 130668432,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130668432?v=4",
|
||||
"html_url": "https:\/\/github.com\/wildptr-io"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wildptr-io\/Winrar-CVE-2023-40477-POC",
|
||||
"description": "CVE-2023-40477 PoC by Wild-Pointer",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-29T16:29:48Z",
|
||||
"updated_at": "2023-08-29T16:30:00Z",
|
||||
"pushed_at": "2023-08-29T16:29:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
125
README.md
125
README.md
|
@ -1279,7 +1279,6 @@
|
|||
- [thomas-osgood/CVE-2023-27163](https://github.com/thomas-osgood/CVE-2023-27163)
|
||||
- [0xFTW/CVE-2023-27163](https://github.com/0xFTW/CVE-2023-27163)
|
||||
- [samh4cks/CVE-2023-27163-InternalProber](https://github.com/samh4cks/CVE-2023-27163-InternalProber)
|
||||
- [josephberger/CVE-2023-27163](https://github.com/josephberger/CVE-2023-27163)
|
||||
|
||||
### CVE-2023-27216 (2023-04-12)
|
||||
|
||||
|
@ -2839,6 +2838,7 @@
|
|||
- [PascalAsch/CVE-2023-38831-KQL](https://github.com/PascalAsch/CVE-2023-38831-KQL)
|
||||
- [my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc](https://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc)
|
||||
- [thegr1ffyn/CVE-2023-38831](https://github.com/thegr1ffyn/CVE-2023-38831)
|
||||
- [MortySecurity/CVE-2023-38831-Exploit-and-Detection](https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection)
|
||||
|
||||
### CVE-2023-38836 (2023-08-21)
|
||||
|
||||
|
@ -2942,6 +2942,10 @@
|
|||
### CVE-2023-40297
|
||||
- [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297)
|
||||
|
||||
### CVE-2023-40477
|
||||
- [winkler-winsen/Scan_WinRAR](https://github.com/winkler-winsen/Scan_WinRAR)
|
||||
- [wildptr-io/Winrar-CVE-2023-40477-POC](https://github.com/wildptr-io/Winrar-CVE-2023-40477-POC)
|
||||
|
||||
### CVE-2023-41080 (2023-08-25)
|
||||
|
||||
<code>URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.\n\nThe vulnerability is limited to the ROOT (default) web application.
|
||||
|
@ -15879,10 +15883,12 @@
|
|||
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
|
||||
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
|
||||
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
|
||||
- [ly4k/CurveBall](https://github.com/ly4k/CurveBall)
|
||||
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
|
||||
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
|
||||
- [BlueTeamSteve/CVE-2020-0601](https://github.com/BlueTeamSteve/CVE-2020-0601)
|
||||
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
|
||||
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
|
||||
- [Doug-Moody/Windows10_Cumulative_Updates_PowerShell](https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell)
|
||||
- [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601)
|
||||
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
|
||||
|
@ -15957,6 +15963,7 @@
|
|||
<code>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
|
||||
</code>
|
||||
|
||||
- [5l1v3r1/CVE-2020-0674](https://github.com/5l1v3r1/CVE-2020-0674)
|
||||
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
|
||||
- [Ken-Abruzzi/CVE-2020-0674](https://github.com/Ken-Abruzzi/CVE-2020-0674)
|
||||
- [Neko-chanQwQ/CVE-2020-0674-PoC](https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC)
|
||||
|
@ -16373,6 +16380,13 @@
|
|||
|
||||
- [0neb1n/CVE-2020-1493](https://github.com/0neb1n/CVE-2020-1493)
|
||||
|
||||
### CVE-2020-1611 (2020-01-15)
|
||||
|
||||
<code>A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
|
||||
</code>
|
||||
|
||||
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
|
||||
|
||||
### CVE-2020-1764 (2020-03-26)
|
||||
|
||||
<code>A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
|
||||
|
@ -20665,6 +20679,7 @@
|
|||
- [JSec1337/Scanner-CVE-2019-0708](https://github.com/JSec1337/Scanner-CVE-2019-0708)
|
||||
- [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI)
|
||||
- [AaronCaiii/CVE-2019-0708-POC](https://github.com/AaronCaiii/CVE-2019-0708-POC)
|
||||
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
|
||||
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
|
||||
- [CircuitSoul/CVE-2019-0708](https://github.com/CircuitSoul/CVE-2019-0708)
|
||||
- [pywc/CVE-2019-0708](https://github.com/pywc/CVE-2019-0708)
|
||||
|
@ -20784,6 +20799,13 @@
|
|||
- [fox-it/cve-2019-1040-scanner](https://github.com/fox-it/cve-2019-1040-scanner)
|
||||
- [QAX-A-Team/dcpwn](https://github.com/QAX-A-Team/dcpwn)
|
||||
|
||||
### CVE-2019-1041 (2019-06-12)
|
||||
|
||||
<code>An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1065.
|
||||
</code>
|
||||
|
||||
- [5l1v3r1/CVE-2019-1041](https://github.com/5l1v3r1/CVE-2019-1041)
|
||||
|
||||
### CVE-2019-1064 (2019-06-12)
|
||||
|
||||
<code>An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.
|
||||
|
@ -20857,6 +20879,13 @@
|
|||
|
||||
- [info4mationprivate8tools/CVE-2019-1205](https://github.com/info4mationprivate8tools/CVE-2019-1205)
|
||||
|
||||
### CVE-2019-1215 (2019-09-11)
|
||||
|
||||
<code>An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.
|
||||
</code>
|
||||
|
||||
- [bluefrostsecurity/CVE-2019-1215](https://github.com/bluefrostsecurity/CVE-2019-1215)
|
||||
|
||||
### CVE-2019-1218 (2019-08-14)
|
||||
|
||||
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages, aka 'Outlook iOS Spoofing Vulnerability'.
|
||||
|
@ -20902,6 +20931,13 @@
|
|||
|
||||
- [mandarenmanman/CVE-2019-1367](https://github.com/mandarenmanman/CVE-2019-1367)
|
||||
|
||||
### CVE-2019-1385 (2019-11-12)
|
||||
|
||||
<code>An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [0x413x4/CVE-2019-1385](https://github.com/0x413x4/CVE-2019-1385)
|
||||
|
||||
### CVE-2019-1388 (2019-11-12)
|
||||
|
||||
<code>An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.
|
||||
|
@ -21373,6 +21409,13 @@
|
|||
|
||||
- [VoidSec/CVE-2019-5624](https://github.com/VoidSec/CVE-2019-5624)
|
||||
|
||||
### CVE-2019-5630 (2019-07-03)
|
||||
|
||||
<code>A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request.
|
||||
</code>
|
||||
|
||||
- [rbeede/CVE-2019-5630](https://github.com/rbeede/CVE-2019-5630)
|
||||
|
||||
### CVE-2019-5700 (2019-10-09)
|
||||
|
||||
<code>NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.
|
||||
|
@ -21402,6 +21445,7 @@
|
|||
- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study)
|
||||
- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc)
|
||||
- [epsteina16/Docker-Escape-Miner](https://github.com/epsteina16/Docker-Escape-Miner)
|
||||
- [geropl/CVE-2019-5736](https://github.com/geropl/CVE-2019-5736)
|
||||
- [GiverOfGifts/CVE-2019-5736-Custom-Runtime](https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime)
|
||||
- [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC)
|
||||
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
|
||||
|
@ -21822,6 +21866,13 @@
|
|||
|
||||
- [jsherman212/used_sock](https://github.com/jsherman212/used_sock)
|
||||
|
||||
### CVE-2019-8601 (2019-12-18)
|
||||
|
||||
<code>Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
|
||||
</code>
|
||||
|
||||
- [BadAccess11/CVE-2019-8601](https://github.com/BadAccess11/CVE-2019-8601)
|
||||
|
||||
### CVE-2019-8605 (2019-12-18)
|
||||
|
||||
<code>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.
|
||||
|
@ -22254,6 +22305,7 @@
|
|||
</code>
|
||||
|
||||
- [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758)
|
||||
- [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758)
|
||||
|
||||
### CVE-2019-10779 (2020-01-27)
|
||||
|
||||
|
@ -22904,6 +22956,13 @@
|
|||
|
||||
- [B3Bo1d/CVE-2019-13403](https://github.com/B3Bo1d/CVE-2019-13403)
|
||||
|
||||
### CVE-2019-13404 (2019-07-07)
|
||||
|
||||
<code>** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.
|
||||
</code>
|
||||
|
||||
- [alidnf/CVE-2019-13404](https://github.com/alidnf/CVE-2019-13404)
|
||||
|
||||
### CVE-2019-13496 (2019-11-04)
|
||||
|
||||
<code>One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response.
|
||||
|
@ -22925,6 +22984,13 @@
|
|||
|
||||
- [FurqanKhan1/CVE-2019-13498](https://github.com/FurqanKhan1/CVE-2019-13498)
|
||||
|
||||
### CVE-2019-13504 (2019-07-10)
|
||||
|
||||
<code>There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.
|
||||
</code>
|
||||
|
||||
- [5l1v3r1/fuzzenv-exiv2](https://github.com/5l1v3r1/fuzzenv-exiv2)
|
||||
|
||||
### CVE-2019-13574 (2019-07-11)
|
||||
|
||||
<code>In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
|
||||
|
@ -23018,6 +23084,7 @@
|
|||
- [Sindadziy/cve-2019-14287](https://github.com/Sindadziy/cve-2019-14287)
|
||||
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
|
||||
- [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287)
|
||||
- [axax002/sudo-vulnerability-CVE-2019-14287](https://github.com/axax002/sudo-vulnerability-CVE-2019-14287)
|
||||
- [SachinthaDeSilva-cmd/Exploit-CVE-2019-14287](https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287)
|
||||
- [HussyCool/CVE-2019-14287-IT18030372-](https://github.com/HussyCool/CVE-2019-14287-IT18030372-)
|
||||
- [ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287](https://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287)
|
||||
|
@ -23030,6 +23097,7 @@
|
|||
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
|
||||
- [crypticdante/CVE-2019-14287](https://github.com/crypticdante/CVE-2019-14287)
|
||||
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
|
||||
- [5l1v3r1/cve-2019-14287sudoexp](https://github.com/5l1v3r1/cve-2019-14287sudoexp)
|
||||
- [MariliaMeira/CVE-2019-14287](https://github.com/MariliaMeira/CVE-2019-14287)
|
||||
|
||||
### CVE-2019-14314 (2019-08-27)
|
||||
|
@ -23218,6 +23286,13 @@
|
|||
- [gozn/detect-CVE-2019-15107-by-pyshark](https://github.com/gozn/detect-CVE-2019-15107-by-pyshark)
|
||||
- [h4ck0rman/CVE-2019-15107](https://github.com/h4ck0rman/CVE-2019-15107)
|
||||
|
||||
### CVE-2019-15112 (2019-08-21)
|
||||
|
||||
<code>The wp-slimstat plugin before 4.8.1 for WordPress has XSS.
|
||||
</code>
|
||||
|
||||
- [5l1v3r1/CVE-2019-15112](https://github.com/5l1v3r1/CVE-2019-15112)
|
||||
|
||||
### CVE-2019-15120 (2019-08-16)
|
||||
|
||||
<code>The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode.
|
||||
|
@ -23375,6 +23450,7 @@
|
|||
- [AnubisSec/CVE-2019-16278](https://github.com/AnubisSec/CVE-2019-16278)
|
||||
- [theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE](https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE)
|
||||
- [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278)
|
||||
- [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278)
|
||||
- [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278)
|
||||
- [crypticdante/CVE-2019-16278](https://github.com/crypticdante/CVE-2019-16278)
|
||||
- [alexander-fernandes/CVE-2019-16278](https://github.com/alexander-fernandes/CVE-2019-16278)
|
||||
|
@ -23575,6 +23651,13 @@
|
|||
|
||||
- [mavlevin/CVE-2019-17424](https://github.com/mavlevin/CVE-2019-17424)
|
||||
|
||||
### CVE-2019-17427 (2019-10-09)
|
||||
|
||||
<code>In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to textile formatting errors.
|
||||
</code>
|
||||
|
||||
- [RealLinkers/CVE-2019-17427](https://github.com/RealLinkers/CVE-2019-17427)
|
||||
|
||||
### CVE-2019-17495 (2019-10-10)
|
||||
|
||||
<code>A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
|
||||
|
@ -23795,6 +23878,13 @@
|
|||
|
||||
- [bobfuzzer/CVE-2019-18885](https://github.com/bobfuzzer/CVE-2019-18885)
|
||||
|
||||
### CVE-2019-18890 (2019-11-21)
|
||||
|
||||
<code>A SQL injection vulnerability in Redmine through 3.2.9 and 3.3.x before 3.3.10 allows Redmine users to access protected information via a crafted object query.
|
||||
</code>
|
||||
|
||||
- [RealLinkers/CVE-2019-18890](https://github.com/RealLinkers/CVE-2019-18890)
|
||||
|
||||
### CVE-2019-18935 (2019-12-11)
|
||||
|
||||
<code>Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
|
||||
|
@ -24037,6 +24127,13 @@
|
|||
- [Vulnmachines/Ctirix_RCE-CVE-2019-19781](https://github.com/Vulnmachines/Ctirix_RCE-CVE-2019-19781)
|
||||
- [k-fire/CVE-2019-19781-exploit](https://github.com/k-fire/CVE-2019-19781-exploit)
|
||||
|
||||
### CVE-2019-19782 (2019-12-13)
|
||||
|
||||
<code>The FTP client in AceaXe Plus 1.0 allows a buffer overflow via a long EHLO response from an FTP server.
|
||||
</code>
|
||||
|
||||
- [Underwood12/CVE-2019-19782](https://github.com/Underwood12/CVE-2019-19782)
|
||||
|
||||
### CVE-2019-19844 (2019-12-18)
|
||||
|
||||
<code>Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
|
||||
|
@ -24084,6 +24181,21 @@
|
|||
|
||||
- [AleDiBen/NVMS1000-Exploit](https://github.com/AleDiBen/NVMS1000-Exploit)
|
||||
|
||||
### CVE-2019-20197 (2019-12-31)
|
||||
|
||||
<code>In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.
|
||||
</code>
|
||||
|
||||
- [lp008/CVE-2019-20197](https://github.com/lp008/CVE-2019-20197)
|
||||
- [jas502n/CVE-2019-20197](https://github.com/jas502n/CVE-2019-20197)
|
||||
|
||||
### CVE-2019-20224 (2020-01-09)
|
||||
|
||||
<code>netflow_get_stats in functions_netflow.php in Pandora FMS 7.0NG allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ip_src parameter in an index.php?operation/netflow/nf_live_view request. This issue has been fixed in Pandora FMS 7.0 NG 742.
|
||||
</code>
|
||||
|
||||
- [mhaskar/CVE-2019-20224](https://github.com/mhaskar/CVE-2019-20224)
|
||||
|
||||
### CVE-2019-20326 (2020-03-16)
|
||||
|
||||
<code>A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.
|
||||
|
@ -25935,12 +26047,14 @@
|
|||
- [gojhonny/libssh-scanner](https://github.com/gojhonny/libssh-scanner)
|
||||
- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
|
||||
- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
|
||||
- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
|
||||
- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
|
||||
- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
|
||||
- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
|
||||
- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
|
||||
- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
|
||||
- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
|
||||
- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
|
||||
- [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
|
||||
- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
|
||||
- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
|
||||
|
@ -33423,6 +33537,7 @@
|
|||
</code>
|
||||
|
||||
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
|
||||
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
|
||||
|
||||
### CVE-2010-1205 (2010-06-30)
|
||||
|
||||
|
@ -33494,6 +33609,7 @@
|
|||
<code>Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."
|
||||
</code>
|
||||
|
||||
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
|
||||
- [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction)
|
||||
|
||||
### CVE-2010-3490 (2010-09-28)
|
||||
|
@ -33517,6 +33633,13 @@
|
|||
|
||||
- [magisterquis/cve-2010-3847](https://github.com/magisterquis/cve-2010-3847)
|
||||
|
||||
### CVE-2010-3904 (2010-12-06)
|
||||
|
||||
<code>The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
|
||||
</code>
|
||||
|
||||
- [redhatkaty/-cve-2010-3904-report](https://github.com/redhatkaty/-cve-2010-3904-report)
|
||||
|
||||
### CVE-2010-3971 (2010-12-22)
|
||||
|
||||
<code>Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka "CSS Memory Corruption Vulnerability."
|
||||
|
|
Loading…
Reference in a new issue