mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-04-15 03:35:36 +02:00
Auto Update 2023/11/08 06:30:55
This commit is contained in:
parent
c4bcd82f21
commit
863b77d2df
47 changed files with 262 additions and 442 deletions
2017
2018
2019
2020
2021
CVE-2021-21972.jsonCVE-2021-24499.jsonCVE-2021-25646.jsonCVE-2021-27651.jsonCVE-2021-3560.jsonCVE-2021-37624.jsonCVE-2021-40444.jsonCVE-2021-41773.jsonCVE-2021-42278.jsonCVE-2021-43798.json
2022
CVE-2022-22954.jsonCVE-2022-22965.jsonCVE-2022-26134.jsonCVE-2022-26923.jsonCVE-2022-38694.jsonCVE-2022-44268.jsonCVE-2022-46169.jsonCVE-2022-46689.json
2023
CVE-2023-2023.jsonCVE-2023-21707.jsonCVE-2023-21746.jsonCVE-2023-22515.jsonCVE-2023-23638.jsonCVE-2023-25610.jsonCVE-2023-25690.jsonCVE-2023-28121.jsonCVE-2023-29360.jsonCVE-2023-29489.jsonCVE-2023-34050.jsonCVE-2023-36745.jsonCVE-2023-36802.jsonCVE-2023-38035.jsonCVE-2023-38646.jsonCVE-2023-38831.jsonCVE-2023-46604.jsonCVE-2023-46747.jsonCVE-2023-4911.json
README.md
|
@ -444,10 +444,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2023-10-18T12:06:40Z",
|
||||
"updated_at": "2023-11-08T03:21:58Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -456,7 +456,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 404,
|
||||
"watchers": 405,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 46,
|
||||
"watchers": 154,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -61,5 +61,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 715935878,
|
||||
"name": "Nuxeo-CVE-2018-16341",
|
||||
"full_name": "CN016\/Nuxeo-CVE-2018-16341",
|
||||
"owner": {
|
||||
"login": "CN016",
|
||||
"id": 108575004,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4",
|
||||
"html_url": "https:\/\/github.com\/CN016"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CN016\/Nuxeo-CVE-2018-16341",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-08T06:08:42Z",
|
||||
"updated_at": "2023-11-08T06:08:43Z",
|
||||
"pushed_at": "2023-11-08T06:08:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-11-06T06:11:04Z",
|
||||
"updated_at": "2023-11-08T03:57:06Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3913,
|
||||
"watchers_count": 3913,
|
||||
"stargazers_count": 3914,
|
||||
"watchers_count": 3914,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1091,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1091,
|
||||
"watchers": 3913,
|
||||
"watchers": 3914,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 46,
|
||||
"watchers": 154,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2023-09-28T11:09:55Z",
|
||||
"updated_at": "2023-11-08T02:37:20Z",
|
||||
"pushed_at": "2020-10-23T19:35:42Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2023-10-18T12:06:40Z",
|
||||
"updated_at": "2023-11-08T03:21:58Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 404,
|
||||
"watchers": 405,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-11-06T06:11:04Z",
|
||||
"updated_at": "2023-11-08T03:57:06Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3913,
|
||||
"watchers_count": 3913,
|
||||
"stargazers_count": 3914,
|
||||
"watchers_count": 3914,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1091,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1091,
|
||||
"watchers": 3913,
|
||||
"watchers": 3914,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2023-11-07T07:02:09Z",
|
||||
"updated_at": "2023-11-08T05:50:34Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1076,
|
||||
"watchers_count": 1076,
|
||||
"stargazers_count": 1077,
|
||||
"watchers_count": 1077,
|
||||
"has_discussions": false,
|
||||
"forks_count": 329,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 329,
|
||||
"watchers": 1076,
|
||||
"watchers": 1077,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
}
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-11-07T15:57:56Z",
|
||||
"updated_at": "2023-11-08T02:22:49Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1142,
|
||||
"watchers_count": 1142,
|
||||
"stargazers_count": 1143,
|
||||
"watchers_count": 1143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 148,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 148,
|
||||
"watchers": 1142,
|
||||
"watchers": 1143,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414051484,
|
||||
"name": "cve-2021-24499",
|
||||
"full_name": "hh-hunter\/cve-2021-24499",
|
||||
"owner": {
|
||||
"login": "hh-hunter",
|
||||
"id": 91593280,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
|
||||
"html_url": "https:\/\/github.com\/hh-hunter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T03:07:31Z",
|
||||
"updated_at": "2021-10-06T03:45:29Z",
|
||||
"pushed_at": "2021-10-06T03:44:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 698068217,
|
||||
"name": "CVE-2021-24499",
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2023-11-07T07:02:09Z",
|
||||
"updated_at": "2023-11-08T05:50:34Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1076,
|
||||
"watchers_count": 1076,
|
||||
"stargazers_count": 1077,
|
||||
"watchers_count": 1077,
|
||||
"has_discussions": false,
|
||||
"forks_count": 329,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 329,
|
||||
"watchers": 1076,
|
||||
"watchers": 1077,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -58,39 +58,5 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 414009465,
|
||||
"name": "CVE-2021-27651",
|
||||
"full_name": "orangmuda\/CVE-2021-27651",
|
||||
"owner": {
|
||||
"login": "orangmuda",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/orangmuda"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
|
||||
"description": "bypass all stages of the password reset flow",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T23:33:50Z",
|
||||
"updated_at": "2023-09-28T11:32:04Z",
|
||||
"pushed_at": "2021-10-05T23:35:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"code-injection",
|
||||
"pega",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -685,5 +685,40 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 715920193,
|
||||
"name": "CVE-2021-3560",
|
||||
"full_name": "LucasPDiniz\/CVE-2021-3560",
|
||||
"owner": {
|
||||
"login": "LucasPDiniz",
|
||||
"id": 57265360,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
|
||||
"html_url": "https:\/\/github.com\/LucasPDiniz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-3560",
|
||||
"description": "Exploitation of the CVE-2021-3560 polkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-08T05:11:56Z",
|
||||
"updated_at": "2023-11-08T05:17:25Z",
|
||||
"pushed_at": "2023-11-08T05:15:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2021-3560",
|
||||
"poc",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-28T13:12:38Z",
|
||||
"updated_at": "2023-09-28T11:33:35Z",
|
||||
"updated_at": "2023-11-08T00:30:22Z",
|
||||
"pushed_at": "2021-12-05T16:54:16Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"voip-telephony-providers"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 27,
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -523,10 +523,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2023-10-29T08:11:27Z",
|
||||
"updated_at": "2023-11-08T03:21:39Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 764,
|
||||
"watchers_count": 764,
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"has_discussions": false,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
|
@ -542,7 +542,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 764,
|
||||
"watchers": 765,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -155,96 +155,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 413943505,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "masahiro331\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "masahiro331",
|
||||
"id": 20438853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
|
||||
"html_url": "https:\/\/github.com\/masahiro331"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T18:56:04Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-06T03:43:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 413969845,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "j4k0m\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "j4k0m",
|
||||
"id": 48088579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
||||
"html_url": "https:\/\/github.com\/j4k0m"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
|
||||
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T20:30:01Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-05T22:06:50Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 413972926,
|
||||
"name": "POC-CVE-2021-41773",
|
||||
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "TishcaTpx",
|
||||
"id": 91351013,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
|
||||
"description": "Poc.py ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T20:41:34Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-05T21:29:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414013246,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
|
@ -342,36 +252,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414050354,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
|
||||
"owner": {
|
||||
"login": "habibiefaried",
|
||||
"id": 4345690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
|
||||
"html_url": "https:\/\/github.com\/habibiefaried"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
|
||||
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T03:01:41Z",
|
||||
"updated_at": "2023-09-28T11:32:04Z",
|
||||
"pushed_at": "2021-10-06T05:39:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414082287,
|
||||
"name": "CVE-2021-41773-POC",
|
||||
|
@ -402,36 +282,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414082633,
|
||||
"name": "cve-2021-41773-nse",
|
||||
"full_name": "TAI-REx\/cve-2021-41773-nse",
|
||||
"owner": {
|
||||
"login": "TAI-REx",
|
||||
"id": 78527947,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
|
||||
"html_url": "https:\/\/github.com\/TAI-REx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
|
||||
"description": "CVE-2021-41773.nse",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T05:36:22Z",
|
||||
"updated_at": "2021-11-26T18:07:10Z",
|
||||
"pushed_at": "2021-10-06T05:23:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 414108838,
|
||||
"name": "CVE-2021-41773",
|
||||
|
@ -2458,10 +2308,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2023-10-31T15:29:07Z",
|
||||
"updated_at": "2023-11-08T02:48:22Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -2479,7 +2329,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 935,
|
||||
"watchers_count": 935,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"forks_count": 189,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"forks": 189,
|
||||
"watchers": 935,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
|
@ -53,13 +53,13 @@
|
|||
"stargazers_count": 653,
|
||||
"watchers_count": 653,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"forks": 113,
|
||||
"watchers": 653,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2023-11-03T08:20:17Z",
|
||||
"updated_at": "2023-11-08T05:50:34Z",
|
||||
"pushed_at": "2023-02-14T07:05:22Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 338,
|
||||
"watchers": 339,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-11-07T15:57:56Z",
|
||||
"updated_at": "2023-11-08T02:22:49Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1142,
|
||||
"watchers_count": 1142,
|
||||
"stargazers_count": 1143,
|
||||
"watchers_count": 1143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 148,
|
||||
"allow_forking": true,
|
||||
|
@ -785,9 +785,9 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 148,
|
||||
"watchers": 1142,
|
||||
"watchers": 1143,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 11
|
||||
},
|
||||
{
|
||||
"id": 554685669,
|
||||
|
|
|
@ -1211,10 +1211,10 @@
|
|||
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T21:01:26Z",
|
||||
"updated_at": "2022-11-09T18:15:41Z",
|
||||
"updated_at": "2023-11-08T02:22:21Z",
|
||||
"pushed_at": "2022-04-07T16:04:53Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1223,7 +1223,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
"forks": 181,
|
||||
"watchers": 1062,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
"subscribers_count": 18
|
||||
},
|
||||
{
|
||||
"id": 499428815,
|
||||
|
|
|
@ -117,6 +117,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-11-04T20:18:44Z",
|
||||
"updated_at": "2023-11-08T02:27:49Z",
|
||||
"pushed_at": "2023-11-05T13:34:13Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": true,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -28,8 +28,8 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
|
@ -564,7 +564,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 677919510,
|
||||
|
|
|
@ -576,10 +576,10 @@
|
|||
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T20:00:23Z",
|
||||
"updated_at": "2023-10-20T05:10:35Z",
|
||||
"updated_at": "2023-11-08T04:39:19Z",
|
||||
"pushed_at": "2023-09-11T17:56:27Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -588,7 +588,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 33,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T00:08:55Z",
|
||||
"updated_at": "2023-10-31T22:21:12Z",
|
||||
"updated_at": "2023-11-08T04:08:36Z",
|
||||
"pushed_at": "2023-10-10T16:53:48Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 112,
|
||||
"watchers": 111,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -1,62 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 430706849,
|
||||
"name": "pxplan",
|
||||
"full_name": "GREENHAT7\/pxplan",
|
||||
"owner": {
|
||||
"login": "GREENHAT7",
|
||||
"id": 94844022,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94844022?v=4",
|
||||
"html_url": "https:\/\/github.com\/GREENHAT7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GREENHAT7\/pxplan",
|
||||
"description": "CVE-2023-2023",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T12:57:22Z",
|
||||
"updated_at": "2023-11-08T00:13:52Z",
|
||||
"pushed_at": "2023-10-15T12:09:05Z",
|
||||
"stargazers_count": 644,
|
||||
"watchers_count": 644,
|
||||
"has_discussions": false,
|
||||
"forks_count": 286,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 644,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
{
|
||||
"id": 677932138,
|
||||
"id": 679185431,
|
||||
"name": "Hvv2023",
|
||||
"full_name": "GREENHAT7\/Hvv2023",
|
||||
"full_name": "thatformat\/Hvv2023",
|
||||
"owner": {
|
||||
"login": "GREENHAT7",
|
||||
"id": 94844022,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94844022?v=4",
|
||||
"html_url": "https:\/\/github.com\/GREENHAT7"
|
||||
"login": "thatformat",
|
||||
"id": 46617017,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46617017?v=4",
|
||||
"html_url": "https:\/\/github.com\/thatformat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GREENHAT7\/Hvv2023",
|
||||
"html_url": "https:\/\/github.com\/thatformat\/Hvv2023",
|
||||
"description": "HW2023@POC@EXP@CVE-2023-2023",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-13T05:54:17Z",
|
||||
"updated_at": "2023-11-07T01:07:52Z",
|
||||
"pushed_at": "2023-09-04T02:47:29Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"created_at": "2023-08-16T09:30:24Z",
|
||||
"updated_at": "2023-11-08T02:48:39Z",
|
||||
"pushed_at": "2023-08-16T08:17:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 52,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 8,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-16T15:57:37Z",
|
||||
"updated_at": "2023-10-14T04:56:23Z",
|
||||
"updated_at": "2023-11-08T03:00:49Z",
|
||||
"pushed_at": "2023-07-16T16:05:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -439,5 +439,40 @@
|
|||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 715922032,
|
||||
"name": "CVE-2023-22515",
|
||||
"full_name": "LucasPDiniz\/CVE-2023-22515",
|
||||
"owner": {
|
||||
"login": "LucasPDiniz",
|
||||
"id": 57265360,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
|
||||
"html_url": "https:\/\/github.com\/LucasPDiniz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2023-22515",
|
||||
"description": "Server Broken Access Control in Confluence - CVE-2023-22515",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-08T05:18:30Z",
|
||||
"updated_at": "2023-11-08T05:22:02Z",
|
||||
"pushed_at": "2023-11-08T05:19:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"confluence",
|
||||
"cve",
|
||||
"cve-2023-22515",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 639303406,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2023-11-06T16:51:10Z",
|
||||
"updated_at": "2023-11-08T06:02:37Z",
|
||||
"pushed_at": "2023-09-10T10:44:32Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 219,
|
||||
"watchers": 220,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -97,36 +97,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 668643357,
|
||||
"name": "CVE-2023-28121",
|
||||
"full_name": "Jenderal92\/CVE-2023-28121",
|
||||
"owner": {
|
||||
"login": "Jenderal92",
|
||||
"id": 59664965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jenderal92"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/CVE-2023-28121",
|
||||
"description": "Python 2.7",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-20T09:28:26Z",
|
||||
"updated_at": "2023-07-20T09:30:47Z",
|
||||
"pushed_at": "2023-07-20T09:30:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 669932793,
|
||||
"name": "CVE-2023-28121",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-24T21:59:23Z",
|
||||
"updated_at": "2023-11-07T07:25:55Z",
|
||||
"updated_at": "2023-11-08T04:46:03Z",
|
||||
"pushed_at": "2023-10-12T19:18:32Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 75,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -237,7 +237,7 @@
|
|||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 648330999,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -18,15 +18,15 @@
|
|||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2023-11-07T07:18:37Z",
|
||||
"updated_at": "2023-11-08T04:35:27Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 123,
|
||||
"forks": 33,
|
||||
"watchers": 124,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T18:33:41Z",
|
||||
"updated_at": "2023-11-07T16:21:31Z",
|
||||
"updated_at": "2023-11-08T04:36:32Z",
|
||||
"pushed_at": "2023-10-26T11:44:46Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 64,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ivanti Sentry CVE-2023-38035",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T17:34:36Z",
|
||||
"updated_at": "2023-11-07T13:41:48Z",
|
||||
"updated_at": "2023-11-08T02:23:02Z",
|
||||
"pushed_at": "2023-08-23T18:42:37Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,9 +25,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 682721180,
|
||||
|
|
|
@ -907,6 +907,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1056,6 +1056,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,21 +13,21 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2023-11-07T09:19:50Z",
|
||||
"updated_at": "2023-11-08T06:30:23Z",
|
||||
"pushed_at": "2023-11-03T12:50:06Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 115,
|
||||
"forks": 14,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 710778413,
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-46604",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T12:22:43Z",
|
||||
"updated_at": "2023-11-07T09:52:45Z",
|
||||
"updated_at": "2023-11-08T05:11:50Z",
|
||||
"pushed_at": "2023-11-03T14:14:31Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T22:06:09Z",
|
||||
"updated_at": "2023-11-07T20:01:57Z",
|
||||
"updated_at": "2023-11-08T02:23:52Z",
|
||||
"pushed_at": "2023-11-03T22:37:16Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -114,13 +114,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -57,7 +57,7 @@
|
|||
"forks": 53,
|
||||
"watchers": 349,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 700404689,
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-4911 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:32:49Z",
|
||||
"updated_at": "2023-11-04T17:37:14Z",
|
||||
"updated_at": "2023-11-08T04:51:13Z",
|
||||
"pushed_at": "2023-10-08T23:24:24Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
14
README.md
14
README.md
|
@ -276,8 +276,7 @@
|
|||
<code>The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
|
||||
</code>
|
||||
|
||||
- [GREENHAT7/pxplan](https://github.com/GREENHAT7/pxplan)
|
||||
- [GREENHAT7/Hvv2023](https://github.com/GREENHAT7/Hvv2023)
|
||||
- [thatformat/Hvv2023](https://github.com/thatformat/Hvv2023)
|
||||
|
||||
### CVE-2023-2033 (2023-04-14)
|
||||
|
||||
|
@ -1317,6 +1316,7 @@
|
|||
- [joaoviictorti/CVE-2023-22515](https://github.com/joaoviictorti/CVE-2023-22515)
|
||||
- [C1ph3rX13/CVE-2023-22515](https://github.com/C1ph3rX13/CVE-2023-22515)
|
||||
- [AIex-3/confluence-hack](https://github.com/AIex-3/confluence-hack)
|
||||
- [LucasPDiniz/CVE-2023-22515](https://github.com/LucasPDiniz/CVE-2023-22515)
|
||||
|
||||
### CVE-2023-22518 (2023-10-31)
|
||||
|
||||
|
@ -2060,7 +2060,6 @@
|
|||
- [gbrsh/CVE-2023-28121](https://github.com/gbrsh/CVE-2023-28121)
|
||||
- [im-hanzou/Mass-CVE-2023-28121](https://github.com/im-hanzou/Mass-CVE-2023-28121)
|
||||
- [rio128128/Mass-CVE-2023-28121-kdoec](https://github.com/rio128128/Mass-CVE-2023-28121-kdoec)
|
||||
- [Jenderal92/CVE-2023-28121](https://github.com/Jenderal92/CVE-2023-28121)
|
||||
- [C04LA/CVE-2023-28121](https://github.com/C04LA/CVE-2023-28121)
|
||||
- [Jenderal92/WP-CVE-2023-28121](https://github.com/Jenderal92/WP-CVE-2023-28121)
|
||||
- [1337nemojj/CVE-2023-28121](https://github.com/1337nemojj/CVE-2023-28121)
|
||||
|
@ -12236,6 +12235,7 @@
|
|||
- [asepsaepdin/CVE-2021-3560](https://github.com/asepsaepdin/CVE-2021-3560)
|
||||
- [pashayogi/ROOT-CVE-2021-3560](https://github.com/pashayogi/ROOT-CVE-2021-3560)
|
||||
- [TieuLong21Prosper/CVE-2021-3560](https://github.com/TieuLong21Prosper/CVE-2021-3560)
|
||||
- [LucasPDiniz/CVE-2021-3560](https://github.com/LucasPDiniz/CVE-2021-3560)
|
||||
|
||||
### CVE-2021-3572 (2021-11-10)
|
||||
|
||||
|
@ -13291,7 +13291,6 @@
|
|||
</code>
|
||||
|
||||
- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
|
||||
- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
|
||||
- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
|
||||
|
||||
### CVE-2021-24507 (2021-08-09)
|
||||
|
@ -13889,7 +13888,6 @@
|
|||
|
||||
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
|
||||
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
|
||||
- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
|
||||
|
||||
### CVE-2021-27850 (2021-04-15)
|
||||
|
||||
|
@ -15991,15 +15989,10 @@
|
|||
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
|
||||
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
|
||||
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
|
||||
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
|
||||
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
|
||||
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
|
||||
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
|
||||
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
|
||||
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
|
||||
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
|
||||
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
|
||||
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
|
||||
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
|
||||
|
@ -29044,6 +29037,7 @@
|
|||
### CVE-2018-16341
|
||||
- [mpgn/CVE-2018-16341](https://github.com/mpgn/CVE-2018-16341)
|
||||
- [puckiestyle/CVE-2018-16341](https://github.com/puckiestyle/CVE-2018-16341)
|
||||
- [CN016/Nuxeo-CVE-2018-16341](https://github.com/CN016/Nuxeo-CVE-2018-16341)
|
||||
|
||||
### CVE-2018-16370 (2018-09-02)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue