Auto Update 2024/01/18 06:29:25

This commit is contained in:
motikan2010-bot 2024-01-18 15:29:25 +09:00
parent 4f9f67afff
commit 82422f1541
59 changed files with 382 additions and 194 deletions

32
2005/CVE-2005-0575.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 744838787,
"name": "CVE-2005-0575",
"full_name": "3t3rn4lv01d\/CVE-2005-0575",
"owner": {
"login": "3t3rn4lv01d",
"id": 78852098,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78852098?v=4",
"html_url": "https:\/\/github.com\/3t3rn4lv01d"
},
"html_url": "https:\/\/github.com\/3t3rn4lv01d\/CVE-2005-0575",
"description": "Exploit for KNet 1.04b Web Server Buffer Overflow SEH",
"fork": false,
"created_at": "2024-01-18T05:29:06Z",
"updated_at": "2024-01-18T05:37:27Z",
"pushed_at": "2024-01-18T05:33:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2015/CVE-2015-1986.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 744846280,
"name": "CVE-2015-1986",
"full_name": "3t3rn4lv01d\/CVE-2015-1986",
"owner": {
"login": "3t3rn4lv01d",
"id": 78852098,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78852098?v=4",
"html_url": "https:\/\/github.com\/3t3rn4lv01d"
},
"html_url": "https:\/\/github.com\/3t3rn4lv01d\/CVE-2015-1986",
"description": "Exploit PoC for Buffer overflow vulnerability in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 (tested in version 6.1.4)",
"fork": false,
"created_at": "2024-01-18T05:54:58Z",
"updated_at": "2024-01-18T06:02:16Z",
"pushed_at": "2024-01-18T05:59:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2016/CVE-2016-8823.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 744772334,
"name": "NDAY_CVE_2016_8823",
"full_name": "SpiralBL0CK\/NDAY_CVE_2016_8823",
"owner": {
"login": "SpiralBL0CK",
"id": 25670930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
"html_url": "https:\/\/github.com\/SpiralBL0CK"
},
"html_url": "https:\/\/github.com\/SpiralBL0CK\/NDAY_CVE_2016_8823",
"description": "PoC under work, CVE-2016-8823",
"fork": false,
"created_at": "2024-01-18T01:10:01Z",
"updated_at": "2024-01-18T01:12:23Z",
"pushed_at": "2024-01-18T01:15:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2017/CVE-2017-17917.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 744803275,
"name": "rails-cve-2017-17917",
"full_name": "matiasarenhard\/rails-cve-2017-17917",
"owner": {
"login": "matiasarenhard",
"id": 14844393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14844393?v=4",
"html_url": "https:\/\/github.com\/matiasarenhard"
},
"html_url": "https:\/\/github.com\/matiasarenhard\/rails-cve-2017-17917",
"description": null,
"fork": false,
"created_at": "2024-01-18T03:08:59Z",
"updated_at": "2024-01-18T03:11:54Z",
"pushed_at": "2024-01-18T03:11:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2024-01-04T16:13:04Z",
"updated_at": "2024-01-18T01:53:20Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"has_discussions": false,
"forks_count": 89,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 89,
"watchers": 198,
"watchers": 199,
"score": 0,
"subscribers_count": 14
},

View file

@ -43,10 +43,10 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2024-01-16T11:44:18Z",
"updated_at": "2024-01-18T05:17:25Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"has_discussions": false,
"forks_count": 94,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 301,
"watchers": 302,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2024-01-05T18:37:54Z",
"updated_at": "2024-01-18T03:52:38Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 315,
"watchers": 316,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2024-01-04T16:30:41Z",
"updated_at": "2024-01-18T04:05:58Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 647,
"watchers_count": 647,
"stargazers_count": 648,
"watchers_count": 648,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 158,
"watchers": 647,
"watchers": 648,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": " [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application ",
"fork": false,
"created_at": "2019-02-17T08:10:50Z",
"updated_at": "2023-09-28T10:58:31Z",
"updated_at": "2024-01-18T01:29:44Z",
"pushed_at": "2019-02-17T08:40:06Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
}

View file

@ -133,10 +133,10 @@
"description": "Adapted CVE-2020-0041 root exploit for Pixel 3",
"fork": false,
"created_at": "2023-08-29T20:48:56Z",
"updated_at": "2023-12-01T22:09:12Z",
"updated_at": "2024-01-18T05:44:25Z",
"pushed_at": "2023-08-29T20:50:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2024-01-13T06:45:48Z",
"updated_at": "2024-01-18T05:47:54Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 708,
"watchers_count": 708,
"stargazers_count": 709,
"watchers_count": 709,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 180,
"watchers": 708,
"watchers": 709,
"score": 0,
"subscribers_count": 19
},

View file

@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-01-07T07:19:27Z",
"updated_at": "2024-01-18T05:29:46Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1112,
"watchers_count": 1112,
"stargazers_count": 1114,
"watchers_count": 1114,
"has_discussions": false,
"forks_count": 287,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 287,
"watchers": 1112,
"watchers": 1114,
"score": 0,
"subscribers_count": 35
},

View file

@ -168,13 +168,13 @@
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 18,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 17,
"watchers": 31,
"score": 0,
"subscribers_count": 2

View file

@ -18,13 +18,13 @@
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 24,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 23,
"watchers": 138,
"score": 0,
"subscribers_count": 10

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-05-12T20:51:50Z",
"updated_at": "2024-01-13T13:10:09Z",
"updated_at": "2024-01-18T05:25:25Z",
"pushed_at": "2023-05-12T20:52:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -1224,10 +1224,10 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2024-01-17T16:03:19Z",
"updated_at": "2024-01-18T02:04:29Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -1236,7 +1236,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 213,
"watchers": 214,
"score": 0,
"subscribers_count": 8
},

View file

@ -103,10 +103,10 @@
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
"fork": false,
"created_at": "2021-09-04T15:34:03Z",
"updated_at": "2023-12-08T12:39:34Z",
"updated_at": "2024-01-18T04:40:08Z",
"pushed_at": "2023-08-25T22:42:24Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 3
},

View file

@ -2142,10 +2142,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-12T02:59:54Z",
"updated_at": "2023-11-03T08:19:14Z",
"updated_at": "2024-01-18T01:55:48Z",
"pushed_at": "2021-12-15T10:19:51Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -2154,7 +2154,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 7
},

View file

@ -110,7 +110,7 @@
"description": null,
"fork": false,
"created_at": "2024-01-07T17:35:26Z",
"updated_at": "2024-01-07T17:43:24Z",
"updated_at": "2024-01-18T05:39:41Z",
"pushed_at": "2024-01-07T17:43:12Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -121,6 +121,7 @@
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1386",
"exploit-scanner",
"ssrf-scanner"
],
"visibility": "public",

View file

@ -43,10 +43,10 @@
"description": "wo ee cve-2022-2185 gitlab authenticated rce",
"fork": false,
"created_at": "2022-07-29T11:14:03Z",
"updated_at": "2023-12-11T06:17:43Z",
"updated_at": "2024-01-18T01:05:14Z",
"pushed_at": "2022-07-29T11:28:59Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-01-17T16:03:51Z",
"updated_at": "2024-01-18T04:13:21Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 736,
"watchers_count": 736,
"stargazers_count": 737,
"watchers_count": 737,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 158,
"watchers": 736,
"watchers": 737,
"score": 0,
"subscribers_count": 16
}

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T20:03:51Z",
"updated_at": "2024-01-17T21:26:06Z",
"updated_at": "2024-01-18T00:57:31Z",
"pushed_at": "2024-01-12T20:15:47Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T20:03:51Z",
"updated_at": "2024-01-17T21:26:06Z",
"updated_at": "2024-01-18T00:57:31Z",
"pushed_at": "2024-01-12T20:15:47Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,10 +133,10 @@
"description": "GoAnywhere MFT CVE-2023-0669 LicenseResponseServlet Deserialization Vulnerabilities Python RCE PoC(Proof of Concept)",
"fork": false,
"created_at": "2023-04-06T03:40:03Z",
"updated_at": "2024-01-15T06:19:24Z",
"updated_at": "2024-01-18T02:35:19Z",
"pushed_at": "2023-07-07T10:42:46Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2024-01-16T16:23:20Z",
"updated_at": "2024-01-18T04:36:58Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 295,
"watchers_count": 295,
"stargazers_count": 296,
"watchers_count": 296,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 295,
"watchers": 296,
"score": 0,
"subscribers_count": 5
},

View file

@ -424,10 +424,10 @@
"description": "CVE-2023-22515",
"fork": false,
"created_at": "2023-10-30T00:17:45Z",
"updated_at": "2024-01-12T15:12:17Z",
"updated_at": "2024-01-18T01:35:08Z",
"pushed_at": "2023-11-10T17:43:40Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -446,7 +446,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
"fork": false,
"created_at": "2024-01-16T08:46:21Z",
"updated_at": "2024-01-17T22:42:47Z",
"pushed_at": "2024-01-17T07:12:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"updated_at": "2024-01-18T06:04:00Z",
"pushed_at": "2024-01-18T02:37:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2024-01-17T03:54:08Z",
"updated_at": "2024-01-18T05:40:12Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 75,
"watchers": 76,
"score": 0,
"subscribers_count": 1
},

View file

@ -223,10 +223,10 @@
"description": "xortigate-cve-2023-27997",
"fork": false,
"created_at": "2023-10-12T16:12:41Z",
"updated_at": "2024-01-05T02:26:45Z",
"updated_at": "2024-01-18T01:59:21Z",
"pushed_at": "2023-10-12T16:17:23Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-04-16T20:20:32Z",
"updated_at": "2024-01-13T13:02:00Z",
"updated_at": "2024-01-18T05:26:53Z",
"pushed_at": "2023-12-26T15:40:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "VMware Aria Operations for Logs CVE-2023-34051",
"fork": false,
"created_at": "2023-10-20T14:59:45Z",
"updated_at": "2024-01-04T17:22:38Z",
"updated_at": "2024-01-18T03:43:59Z",
"pushed_at": "2023-10-20T15:00:10Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 60,
"forks": 11,
"watchers": 61,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-23T19:06:36Z",
"updated_at": "2024-01-16T06:20:43Z",
"updated_at": "2024-01-18T02:56:57Z",
"pushed_at": "2023-10-29T11:12:26Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 141,
"watchers": 142,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Ivanti Sentry CVE-2023-38035",
"fork": false,
"created_at": "2023-08-23T17:34:36Z",
"updated_at": "2023-12-20T07:13:51Z",
"updated_at": "2024-01-18T02:21:09Z",
"pushed_at": "2023-08-23T18:42:37Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-01-16T16:23:42Z",
"updated_at": "2024-01-18T01:15:47Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 736,
"watchers_count": 736,
"stargazers_count": 737,
"watchers_count": 737,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 134,
"watchers": 736,
"watchers": 737,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-01-17T10:05:40Z",
"updated_at": "2024-01-18T01:38:53Z",
"pushed_at": "2023-10-15T01:28:07Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-42820",
"fork": false,
"created_at": "2023-10-10T06:32:51Z",
"updated_at": "2024-01-04T02:38:28Z",
"updated_at": "2024-01-18T04:34:34Z",
"pushed_at": "2023-10-29T12:12:32Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
},

View file

@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,7 +27,7 @@
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 743886715,

View file

@ -77,10 +77,10 @@
"description": "Tool for checking the Ivanti Connect Secure System Snapshot for IOCs related to CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-16T19:19:52Z",
"updated_at": "2024-01-17T20:19:51Z",
"updated_at": "2024-01-18T04:10:39Z",
"pushed_at": "2024-01-16T19:22:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-16T19:40:59Z",
"updated_at": "2024-01-17T11:13:47Z",
"updated_at": "2024-01-18T01:42:05Z",
"pushed_at": "2024-01-17T19:14:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -137,10 +137,10 @@
"description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-17T10:29:02Z",
"updated_at": "2024-01-17T10:29:02Z",
"updated_at": "2024-01-18T04:13:40Z",
"pushed_at": "2024-01-17T10:35:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -149,8 +149,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -30,6 +30,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,6 +29,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -103,10 +103,10 @@
"description": "Scans an executable and determines if it was wrapped in an Electron version vulnerable to the Chromium vulnerability CVE-2023-4863\/ CVE-2023-5129",
"fork": false,
"created_at": "2023-09-29T00:42:37Z",
"updated_at": "2023-11-27T20:06:10Z",
"updated_at": "2024-01-18T03:27:12Z",
"pushed_at": "2023-09-29T01:44:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -188,6 +188,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,12 +43,12 @@
"description": "CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T10:53:50Z",
"updated_at": "2024-01-17T17:47:29Z",
"updated_at": "2024-01-18T05:16:38Z",
"pushed_at": "2024-01-12T13:56:38Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -57,8 +57,8 @@
"gitlab"
],
"visibility": "public",
"forks": 6,
"watchers": 44,
"forks": 7,
"watchers": 45,
"score": 0,
"subscribers_count": 1
},
@ -106,10 +106,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-01-17T21:45:03Z",
"updated_at": "2024-01-18T06:25:08Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -118,8 +118,38 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 168,
"watchers": 171,
"score": 0,
"subscribers_count": 2
},
{
"id": 744835323,
"name": "CVE-2023-7028",
"full_name": "yoryio\/CVE-2023-7028",
"owner": {
"login": "yoryio",
"id": 134471901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
"html_url": "https:\/\/github.com\/yoryio"
},
"html_url": "https:\/\/github.com\/yoryio\/CVE-2023-7028",
"description": "Exploit for CVE-2023-7028",
"fork": false,
"created_at": "2024-01-18T05:17:00Z",
"updated_at": "2024-01-18T05:17:01Z",
"pushed_at": "2024-01-18T05:22:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-01-17T16:13:54Z",
"updated_at": "2024-01-18T03:56:39Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2024-21305. ",
"fork": false,
"created_at": "2023-12-16T23:27:34Z",
"updated_at": "2024-01-17T19:44:57Z",
"updated_at": "2024-01-18T02:45:58Z",
"pushed_at": "2024-01-14T17:21:42Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -77,10 +77,10 @@
"description": "Tool for checking the Ivanti Connect Secure System Snapshot for IOCs related to CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-16T19:19:52Z",
"updated_at": "2024-01-17T20:19:51Z",
"updated_at": "2024-01-18T04:10:39Z",
"pushed_at": "2024-01-16T19:22:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-16T19:40:59Z",
"updated_at": "2024-01-17T11:13:47Z",
"updated_at": "2024-01-18T01:42:05Z",
"pushed_at": "2024-01-17T19:14:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -167,10 +167,10 @@
"description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-17T10:29:02Z",
"updated_at": "2024-01-17T10:29:02Z",
"updated_at": "2024-01-18T04:13:40Z",
"pushed_at": "2024-01-17T10:35:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -179,8 +179,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "InstaWP Connect <= 0.1.0.8 - Missing Authorization to Arbitrary Options Update (Subscriber+)",
"fork": false,
"created_at": "2024-01-17T20:56:21Z",
"updated_at": "2024-01-17T20:59:31Z",
"updated_at": "2024-01-18T02:14:57Z",
"pushed_at": "2024-01-17T20:59:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -30,8 +30,8 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1148,6 +1148,7 @@
- [RandomRobbieBF/CVE-2023-7028](https://github.com/RandomRobbieBF/CVE-2023-7028)
- [duy-31/CVE-2023-7028](https://github.com/duy-31/CVE-2023-7028)
- [Vozec/CVE-2023-7028](https://github.com/Vozec/CVE-2023-7028)
- [yoryio/CVE-2023-7028](https://github.com/yoryio/CVE-2023-7028)
### CVE-2023-7172 (2023-12-30)
@ -34001,6 +34002,13 @@
- [0xSojalSec/Nuclei-TemplatesNuclei-Templates-CVE-2017-17736](https://github.com/0xSojalSec/Nuclei-TemplatesNuclei-Templates-CVE-2017-17736)
### CVE-2017-17917 (2017-12-29)
<code>** DISPUTED ** SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
</code>
- [matiasarenhard/rails-cve-2017-17917](https://github.com/matiasarenhard/rails-cve-2017-17917)
### CVE-2017-18019 (2018-01-03)
<code>In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \\.\K7Sentry DeviceIoControl call with an invalid kernel pointer.
@ -35226,6 +35234,13 @@
- [akzedevops/CVE-2016-8776](https://github.com/akzedevops/CVE-2016-8776)
### CVE-2016-8823 (2016-12-16)
<code>All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer handler for DxgDdiEscape where the size of an input buffer is not validated leading to a denial of service or possible escalation of privileges
</code>
- [SpiralBL0CK/NDAY_CVE_2016_8823](https://github.com/SpiralBL0CK/NDAY_CVE_2016_8823)
### CVE-2016-8858 (2016-12-09)
<code>** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that &quot;OpenSSH upstream does not consider this as a security issue.&quot;
@ -35722,6 +35737,13 @@
- [vpereira/CVE-2015-1855](https://github.com/vpereira/CVE-2015-1855)
### CVE-2015-1986 (2015-06-30)
<code>The server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to execute arbitrary commands via unspecified vectors, a different vulnerability than CVE-2015-1938.
</code>
- [3t3rn4lv01d/CVE-2015-1986](https://github.com/3t3rn4lv01d/CVE-2015-1986)
### CVE-2015-2153 (2015-03-24)
<code>The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
@ -38757,6 +38779,13 @@
## 2005
### CVE-2005-0575 (2005-02-27)
<code>Buffer overflow in Stormy Studios Knet 1.04c and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP GET request.
</code>
- [3t3rn4lv01d/CVE-2005-0575](https://github.com/3t3rn4lv01d/CVE-2005-0575)
### CVE-2005-0603 (2005-03-01)
<code>viewtopic.php in phpBB 2.0.12 and earlier allows remote attackers to obtain sensitive information via a highlight parameter containing invalid regular expression syntax, which reveals the path in a PHP error message.