Auto Update 2024/03/15 06:26:51

This commit is contained in:
motikan2010-bot 2024-03-15 15:26:51 +09:00
parent 6b1381538f
commit 80ee32bfcd
42 changed files with 171 additions and 136 deletions

View file

@ -18,7 +18,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 9,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"cve-2008-1613"
],
"visibility": "public",
"forks": 9,
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 3

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 3

View file

@ -18,7 +18,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"webcam"
],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 4

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 12,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 11,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 22,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 21,
"watchers": 52,
"score": 0,
"subscribers_count": 7

View file

@ -18,13 +18,13 @@
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 22,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 21,
"watchers": 52,
"score": 0,
"subscribers_count": 7

View file

@ -43,10 +43,10 @@
"description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ",
"fork": false,
"created_at": "2017-11-19T16:50:39Z",
"updated_at": "2024-02-06T10:30:34Z",
"updated_at": "2024-03-15T00:49:22Z",
"pushed_at": "2022-03-07T20:04:08Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-03-14T15:54:41Z",
"updated_at": "2024-03-15T01:45:42Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 6
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 635,
"watchers_count": 635,
"has_discussions": false,
"forks_count": 134,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -67,7 +67,7 @@
"xss"
],
"visibility": "public",
"forks": 134,
"forks": 130,
"watchers": 635,
"score": 0,
"subscribers_count": 16

View file

@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-03-14T16:42:08Z",
"updated_at": "2024-03-15T02:25:02Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 585,
"watchers_count": 585,
"stargazers_count": 586,
"watchers_count": 586,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 585,
"watchers": 586,
"score": 0,
"subscribers_count": 13
},

View file

@ -152,35 +152,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 528229688,
"name": "CVE-2021-36749",
"full_name": "hanch7274\/CVE-2021-36749",
"owner": {
"login": "hanch7274",
"id": 39052167,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39052167?v=4",
"html_url": "https:\/\/github.com\/hanch7274"
},
"html_url": "https:\/\/github.com\/hanch7274\/CVE-2021-36749",
"description": null,
"fork": false,
"created_at": "2022-08-24T02:01:17Z",
"updated_at": "2022-08-24T02:01:17Z",
"pushed_at": "2022-08-24T02:01:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -3666,10 +3666,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-03-14T01:16:31Z",
"updated_at": "2024-03-15T01:18:07Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3340,
"watchers_count": 3340,
"stargazers_count": 3341,
"watchers_count": 3341,
"has_discussions": true,
"forks_count": 741,
"allow_forking": true,
@ -3678,7 +3678,7 @@
"topics": [],
"visibility": "public",
"forks": 741,
"watchers": 3340,
"watchers": 3341,
"score": 0,
"subscribers_count": 57
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25943",
"fork": false,
"created_at": "2021-07-09T23:34:57Z",
"updated_at": "2024-01-22T03:48:30Z",
"updated_at": "2024-03-15T01:49:56Z",
"pushed_at": "2022-03-09T08:26:45Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 4
},

View file

@ -157,7 +157,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 498322212,

View file

@ -27,6 +27,6 @@
"forks": 12,
"watchers": 140,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"unisoc"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 16,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-02-26T04:56:50Z",
"updated_at": "2024-03-15T02:24:35Z",
"pushed_at": "2024-02-11T03:01:51Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-03-10T04:41:34Z",
"updated_at": "2024-03-13T18:42:38Z",
"pushed_at": "2024-03-11T06:39:19Z",
"pushed_at": "2024-03-15T06:07:45Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -404,7 +404,7 @@
"fork": false,
"created_at": "2024-01-24T04:44:59Z",
"updated_at": "2024-03-15T00:11:11Z",
"pushed_at": "2024-03-13T05:48:15Z",
"pushed_at": "2024-03-15T05:15:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
@ -556,10 +556,10 @@
"description": "CVE-2023-22527 内存马注入工具",
"fork": false,
"created_at": "2024-02-11T16:46:55Z",
"updated_at": "2024-03-11T04:45:08Z",
"updated_at": "2024-03-15T03:22:52Z",
"pushed_at": "2024-02-21T05:49:59Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -568,7 +568,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2024-03-05T13:52:33Z",
"pushed_at": "2023-03-20T12:51:29Z",
"pushed_at": "2024-03-15T02:02:35Z",
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-27T12:22:05Z",
"updated_at": "2024-03-07T18:41:48Z",
"updated_at": "2024-03-15T05:57:47Z",
"pushed_at": "2023-07-10T16:57:44Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 161,
"watchers": 162,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2024-03-14T10:00:24Z",
"updated_at": "2024-03-15T03:21:46Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-15T04:16:46Z",
"updated_at": "2024-03-06T08:17:32Z",
"updated_at": "2024-03-15T02:27:43Z",
"pushed_at": "2023-08-17T11:43:26Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 112,
"watchers": 113,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-03-12T02:54:53Z",
"updated_at": "2024-03-15T00:44:02Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 442,
"watchers_count": 442,
"stargazers_count": 443,
"watchers_count": 443,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 442,
"watchers": 443,
"score": 0,
"subscribers_count": 14
}

View file

@ -364,6 +364,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 87,
"score": 0,
"subscribers_count": 2
},
{
"id": 772397651,
"name": "CVE-2023-33733",
"full_name": "onion2203\/CVE-2023-33733",
"owner": {
"login": "onion2203",
"id": 63358014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63358014?v=4",
"html_url": "https:\/\/github.com\/onion2203"
},
"html_url": "https:\/\/github.com\/onion2203\/CVE-2023-33733",
"description": "Research CVE-2023-33733",
"fork": false,
"created_at": "2024-03-15T05:35:40Z",
"updated_at": "2024-03-15T05:37:30Z",
"pushed_at": "2024-03-15T05:35:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,7 +27,7 @@
"forks": 37,
"watchers": 173,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
},
{
"id": 704591586,

View file

@ -48,7 +48,7 @@
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,7 +60,7 @@
"redteam"
],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 170,
"score": 0,
"subscribers_count": 2

32
2023/CVE-2023-48788.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 772343143,
"name": "CVE-2023-48788-PoC",
"full_name": "k4rd3n\/CVE-2023-48788-PoC",
"owner": {
"login": "k4rd3n",
"id": 163474759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163474759?v=4",
"html_url": "https:\/\/github.com\/k4rd3n"
},
"html_url": "https:\/\/github.com\/k4rd3n\/CVE-2023-48788-PoC",
"description": "CVE-2023-48788 is a SQLi vulnerability which leads to unauthenticated remote code executing in fortinet's FortiClientEMS.",
"fork": false,
"created_at": "2024-03-15T02:14:41Z",
"updated_at": "2024-03-15T02:14:41Z",
"pushed_at": "2024-03-15T02:15:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -106,10 +106,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-03-15T00:11:01Z",
"updated_at": "2024-03-15T05:29:00Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 226,
"watchers_count": 226,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -118,7 +118,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 225,
"watchers": 226,
"score": 0,
"subscribers_count": 6
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -57,7 +57,7 @@
"forks": 122,
"watchers": 540,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 758688293,

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-02T02:51:29Z",
"updated_at": "2024-03-10T06:28:15Z",
"updated_at": "2024-03-15T02:55:24Z",
"pushed_at": "2024-02-02T09:49:34Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-03-14T16:29:19Z",
"updated_at": "2024-03-15T04:00:52Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -55,9 +55,9 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 770363870,
@ -103,19 +103,19 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-03-14T14:49:53Z",
"updated_at": "2024-03-15T04:28:02Z",
"pushed_at": "2024-03-13T09:53:21Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 21,
"forks": 2,
"watchers": 22,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-01-27T15:36:05Z",
"updated_at": "2024-02-09T20:03:09Z",
"pushed_at": "2024-01-27T19:18:18Z",
"pushed_at": "2024-03-15T03:19:43Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898",
"fork": false,
"created_at": "2024-01-23T19:19:04Z",
"updated_at": "2024-02-20T14:14:11Z",
"updated_at": "2024-03-15T03:05:36Z",
"pushed_at": "2024-02-20T14:13:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-14T17:48:49Z",
"updated_at": "2024-03-14T17:49:52Z",
"updated_at": "2024-03-15T02:23:36Z",
"pushed_at": "2024-03-14T17:49:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -4722,6 +4722,7 @@
</code>
- [c53elyas/CVE-2023-33733](https://github.com/c53elyas/CVE-2023-33733)
- [onion2203/CVE-2023-33733](https://github.com/onion2203/CVE-2023-33733)
### CVE-2023-33768 (2023-07-13)
@ -7540,6 +7541,9 @@
### CVE-2023-48777
- [AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777](https://github.com/AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777)
### CVE-2023-48788
- [k4rd3n/CVE-2023-48788-PoC](https://github.com/k4rd3n/CVE-2023-48788-PoC)
### CVE-2023-48842 (2023-12-01)
<code>D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at hedwig.cgi.
@ -18558,7 +18562,6 @@
- [dorkerdevil/CVE-2021-36749](https://github.com/dorkerdevil/CVE-2021-36749)
- [zwlsix/apache_druid_CVE-2021-36749](https://github.com/zwlsix/apache_druid_CVE-2021-36749)
- [Jun-5heng/CVE-2021-36749](https://github.com/Jun-5heng/CVE-2021-36749)
- [hanch7274/CVE-2021-36749](https://github.com/hanch7274/CVE-2021-36749)
### CVE-2021-36782 (2022-09-07)