Auto Update 2025/01/17 12:32:28

This commit is contained in:
motikan2010-bot 2025-01-17 21:32:28 +09:00
parent 4cc2c2e408
commit 8ac38987b1
66 changed files with 1256 additions and 156 deletions

View file

@ -246,13 +246,13 @@
"stargazers_count": 493,
"watchers_count": 493,
"has_discussions": false,
"forks_count": 145,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 145,
"forks": 146,
"watchers": 493,
"score": 0,
"subscribers_count": 21

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-17T03:21:16Z",
"updated_at": "2025-01-17T08:44:37Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 176,
"watchers": 178,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2024-12-27T03:05:22Z",
"updated_at": "2025-01-17T09:27:03Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 758,
"watchers_count": 758,
"stargazers_count": 759,
"watchers_count": 759,
"has_discussions": false,
"forks_count": 168,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 168,
"watchers": 758,
"watchers": 759,
"score": 0,
"subscribers_count": 41
},

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2025-01-17T02:08:32Z",
"updated_at": "2025-01-17T07:31:00Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 225,
"watchers_count": 225,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 224,
"watchers": 225,
"score": 0,
"subscribers_count": 10
}

View file

@ -375,10 +375,10 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
"updated_at": "2024-12-11T14:22:18Z",
"updated_at": "2025-01-17T06:25:29Z",
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -387,7 +387,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 5
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2025-01-06T03:02:21Z",
"updated_at": "2025-01-17T06:27:10Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 495,
"watchers_count": 495,
"stargazers_count": 496,
"watchers_count": 496,
"has_discussions": false,
"forks_count": 191,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 191,
"watchers": 495,
"watchers": 496,
"score": 0,
"subscribers_count": 23
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2025-01-13T08:49:52Z",
"updated_at": "2025-01-17T06:23:10Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1801,
"watchers_count": 1801,
"stargazers_count": 1802,
"watchers_count": 1802,
"has_discussions": false,
"forks_count": 249,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 249,
"watchers": 1801,
"watchers": 1802,
"score": 0,
"subscribers_count": 37
},
@ -107,10 +107,10 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2024-12-16T11:23:42Z",
"updated_at": "2025-01-17T06:23:00Z",
"pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 4
},

View file

@ -107,10 +107,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2025-01-08T16:50:27Z",
"updated_at": "2025-01-17T07:50:12Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 951,
"watchers_count": 951,
"stargazers_count": 952,
"watchers_count": 952,
"has_discussions": false,
"forks_count": 176,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 176,
"watchers": 951,
"watchers": 952,
"score": 0,
"subscribers_count": 18
},

View file

@ -65,10 +65,10 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2024-12-03T03:14:00Z",
"updated_at": "2025-01-17T09:53:36Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -77,7 +77,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 282,
"watchers": 283,
"score": 0,
"subscribers_count": 7
},
@ -1016,5 +1016,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 918084911,
"name": "weblogic-cve-2020-14882",
"full_name": "KKC73\/weblogic-cve-2020-14882",
"owner": {
"login": "KKC73",
"id": 50138914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50138914?v=4",
"html_url": "https:\/\/github.com\/KKC73",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/KKC73\/weblogic-cve-2020-14882",
"description": "This is a repository that aims to provide research material on CVE-2020-14882 as part of a project in partial fullfilment of ACS EDU Program.",
"fork": false,
"created_at": "2025-01-17T08:13:39Z",
"updated_at": "2025-01-17T08:15:24Z",
"pushed_at": "2025-01-17T08:15:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -386,10 +386,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-12-15T13:01:38Z",
"updated_at": "2025-01-17T07:49:43Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 369,
"watchers_count": 369,
"stargazers_count": 370,
"watchers_count": 370,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -404,7 +404,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 369,
"watchers": 370,
"score": 0,
"subscribers_count": 5
},
@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-17T03:21:16Z",
"updated_at": "2025-01-17T08:44:37Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 176,
"watchers": 178,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2025-01-16T06:34:05Z",
"updated_at": "2025-01-17T08:04:47Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1856,
"watchers_count": 1856,
"stargazers_count": 1857,
"watchers_count": 1857,
"has_discussions": false,
"forks_count": 585,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 585,
"watchers": 1856,
"watchers": 1857,
"score": 0,
"subscribers_count": 43
},

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-16T10:30:47Z",
"updated_at": "2025-01-17T07:55:13Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1367,
"watchers_count": 1367,
"stargazers_count": 1368,
"watchers_count": 1368,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1367,
"watchers": 1368,
"score": 0,
"subscribers_count": 15
}

View file

@ -1307,10 +1307,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2025-01-15T09:32:37Z",
"updated_at": "2025-01-17T10:00:13Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 811,
"watchers_count": 811,
"stargazers_count": 812,
"watchers_count": 812,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1324,7 +1324,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 811,
"watchers": 812,
"score": 0,
"subscribers_count": 11
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2025-01-15T07:40:15Z",
"updated_at": "2025-01-17T07:44:07Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 282,
"watchers": 283,
"score": 0,
"subscribers_count": 9
}

View file

@ -14,10 +14,10 @@
"description": "PoC of CVE-2022-20474",
"fork": false,
"created_at": "2024-11-14T08:48:59Z",
"updated_at": "2024-12-01T14:56:17Z",
"updated_at": "2025-01-17T11:42:27Z",
"pushed_at": "2024-12-01T14:56:14Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-16T10:30:47Z",
"updated_at": "2025-01-17T07:55:13Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1367,
"watchers_count": 1367,
"stargazers_count": 1368,
"watchers_count": 1368,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1367,
"watchers": 1368,
"score": 0,
"subscribers_count": 15
}

View file

@ -332,10 +332,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2025-01-11T06:37:47Z",
"updated_at": "2025-01-17T09:16:07Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 378,
"watchers_count": 378,
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -344,7 +344,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 378,
"watchers": 379,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T14:24:12Z",
"updated_at": "2025-01-16T13:12:41Z",
"updated_at": "2025-01-17T09:19:33Z",
"pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 343,
"watchers_count": 343,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 342,
"watchers": 343,
"score": 0,
"subscribers_count": 7
},
@ -743,19 +743,19 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-17T04:41:20Z",
"updated_at": "2025-01-17T11:03:19Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 11,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 33,
"forks": 15,
"watchers": 37,
"score": 0,
"subscribers_count": 5
},

View file

@ -593,6 +593,37 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 738213429,
"name": "Exploit-CVE-2023-22515",
"full_name": "CalegariMindSec\/Exploit-CVE-2023-22515",
"owner": {
"login": "CalegariMindSec",
"id": 68512056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512056?v=4",
"html_url": "https:\/\/github.com\/CalegariMindSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CalegariMindSec\/Exploit-CVE-2023-22515",
"description": "A simple exploit for CVE-2023-22515",
"fork": false,
"created_at": "2024-01-02T17:40:24Z",
"updated_at": "2024-01-02T23:11:04Z",
"pushed_at": "2024-01-02T23:15:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 762759550,
"name": "CVE-2023-22515",

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 795324648,
"name": "CVE-2023-24329-Exploit",
"full_name": "PenTestMano\/CVE-2023-24329-Exploit",
"owner": {
"login": "PenTestMano",
"id": 162714784,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162714784?v=4",
"html_url": "https:\/\/github.com\/PenTestMano",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PenTestMano\/CVE-2023-24329-Exploit",
"description": "Example of CVE-2023-24329 ",
"fork": false,
"created_at": "2024-05-03T03:16:02Z",
"updated_at": "2024-05-03T03:16:02Z",
"pushed_at": "2023-10-13T07:42:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -417,6 +417,68 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 739001610,
"name": "CVE-2023-27163",
"full_name": "Rubioo02\/CVE-2023-27163",
"owner": {
"login": "Rubioo02",
"id": 153825296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153825296?v=4",
"html_url": "https:\/\/github.com\/Rubioo02",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rubioo02\/CVE-2023-27163",
"description": "A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1)",
"fork": false,
"created_at": "2024-01-04T14:46:13Z",
"updated_at": "2024-01-04T17:04:49Z",
"pushed_at": "2024-01-04T16:40:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 739760866,
"name": "CVE-2023-27163",
"full_name": "madhavmehndiratta\/CVE-2023-27163",
"owner": {
"login": "madhavmehndiratta",
"id": 43489174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43489174?v=4",
"html_url": "https:\/\/github.com\/madhavmehndiratta",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/madhavmehndiratta\/CVE-2023-27163",
"description": "PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163)",
"fork": false,
"created_at": "2024-01-06T13:16:29Z",
"updated_at": "2024-01-06T15:53:16Z",
"pushed_at": "2024-01-06T15:52:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 820848497,
"name": "CVE-2023-27163-ssrf-to-port-scanning",

View file

@ -92,6 +92,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737810016,
"name": "Compiled-PoC-Binary-For-CVE-2023-28252",
"full_name": "bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
"owner": {
"login": "bkstephen",
"id": 8013595,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8013595?v=4",
"html_url": "https:\/\/github.com\/bkstephen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
"description": "The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252",
"fork": false,
"created_at": "2024-01-01T15:30:33Z",
"updated_at": "2024-06-21T07:22:21Z",
"pushed_at": "2024-01-01T15:39:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 746601760,
"name": "CVE-2023-28252-Compiled-exe",

View file

@ -498,6 +498,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 740067240,
"name": "CVE-2023-28432",
"full_name": "netuseradministrator\/CVE-2023-28432",
"owner": {
"login": "netuseradministrator",
"id": 96680088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96680088?v=4",
"html_url": "https:\/\/github.com\/netuseradministrator",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/netuseradministrator\/CVE-2023-28432",
"description": null,
"fork": false,
"created_at": "2024-01-07T12:34:49Z",
"updated_at": "2024-01-31T02:25:36Z",
"pushed_at": "2024-01-07T15:20:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 741968176,
"name": "CVE-2023-28432",

View file

@ -130,6 +130,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737886117,
"name": "CVE-2023-29357-Check",
"full_name": "Jev1337\/CVE-2023-29357-Check",
"owner": {
"login": "Jev1337",
"id": 19759761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19759761?v=4",
"html_url": "https:\/\/github.com\/Jev1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jev1337\/CVE-2023-29357-Check",
"description": "A Python script that verifies whether a target is vulnerable to CVE-2023-29357 or not",
"fork": false,
"created_at": "2024-01-01T21:08:22Z",
"updated_at": "2024-11-06T09:07:45Z",
"pushed_at": "2024-01-01T21:13:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 856513093,
"name": "Event-ID-189-Rule-Name-SOC227-CVE-2023-29357",

33
2023/CVE-2023-31446.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 739746679,
"name": "CVE-2023-31446-Remote-Code-Execution",
"full_name": "Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution",
"owner": {
"login": "Dodge-MPTC",
"id": 75072113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75072113?v=4",
"html_url": "https:\/\/github.com\/Dodge-MPTC",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution",
"description": "Repository contains description for CVE-2023-31446",
"fork": false,
"created_at": "2024-01-06T12:23:50Z",
"updated_at": "2024-01-09T09:34:42Z",
"pushed_at": "2024-01-06T12:57:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -233,6 +233,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737660313,
"name": "MOVEit-CVE-2023-34362",
"full_name": "Chinyemba-ck\/MOVEit-CVE-2023-34362",
"owner": {
"login": "Chinyemba-ck",
"id": 85675608,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85675608?v=4",
"html_url": "https:\/\/github.com\/Chinyemba-ck",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chinyemba-ck\/MOVEit-CVE-2023-34362",
"description": "A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project)",
"fork": false,
"created_at": "2024-01-01T00:55:07Z",
"updated_at": "2024-01-01T00:55:07Z",
"pushed_at": "2024-01-01T00:56:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 821497009,
"name": "MoveIT-CVE-2023-34362-RCE",

View file

@ -67,6 +67,37 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 739947067,
"name": "CVE-2023-38408",
"full_name": "classic130\/CVE-2023-38408",
"owner": {
"login": "classic130",
"id": 69665702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69665702?v=4",
"html_url": "https:\/\/github.com\/classic130",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/classic130\/CVE-2023-38408",
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2024-01-07T03:03:06Z",
"updated_at": "2024-09-08T06:41:32Z",
"pushed_at": "2023-07-25T22:16:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 758630242,
"name": "CVE-2023-38408",

View file

@ -1099,6 +1099,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 767222866,
"name": "CVE-2023-38646",
"full_name": "DaniTheHack3r\/CVE-2023-38646",
"owner": {
"login": "DaniTheHack3r",
"id": 51076007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51076007?v=4",
"html_url": "https:\/\/github.com\/DaniTheHack3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DaniTheHack3r\/CVE-2023-38646",
"description": "CVE-2023-38646 Metabase 0.46.6 exploit",
"fork": false,
"created_at": "2024-03-04T23:01:43Z",
"updated_at": "2024-03-04T23:01:48Z",
"pushed_at": "2023-10-11T15:26:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 892415497,
"name": "cve-2023-38646-poc",

33
2023/CVE-2023-40084.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 739336852,
"name": "platform_system_netd_AOSP10_r33_CVE-2023-40084",
"full_name": "Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084",
"description": null,
"fork": false,
"created_at": "2024-01-05T10:20:57Z",
"updated_at": "2024-01-05T10:22:41Z",
"pushed_at": "2024-01-05T10:23:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
"updated_at": "2024-10-11T01:41:10Z",
"updated_at": "2025-01-17T07:24:59Z",
"pushed_at": "2023-10-13T11:19:10Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,7 +14,7 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-17T04:44:33Z",
"updated_at": "2025-01-17T11:20:55Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1389,
"watchers_count": 1389,

33
2023/CVE-2023-48981.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 737775658,
"name": "CVE-2023-48981",
"full_name": "tristao-marinho\/CVE-2023-48981",
"owner": {
"login": "tristao-marinho",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981",
"description": "POC CVE-2023-48981",
"fork": false,
"created_at": "2024-01-01T13:06:39Z",
"updated_at": "2024-01-01T13:06:40Z",
"pushed_at": "2024-01-01T13:18:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2023/CVE-2023-48982.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 737777512,
"name": "CVE-2023-48982",
"full_name": "tristao-marinho\/CVE-2023-48982",
"owner": {
"login": "tristao-marinho",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982",
"description": "POC CVE-2023-48982",
"fork": false,
"created_at": "2024-01-01T13:14:49Z",
"updated_at": "2024-01-01T13:14:49Z",
"pushed_at": "2024-01-01T13:17:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2023/CVE-2023-48983.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 737778720,
"name": "CVE-2023-48983",
"full_name": "tristao-marinho\/CVE-2023-48983",
"owner": {
"login": "tristao-marinho",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983",
"description": "POC CVE-2023-48983",
"fork": false,
"created_at": "2024-01-01T13:19:54Z",
"updated_at": "2024-01-02T12:18:35Z",
"pushed_at": "2024-01-01T13:23:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -103,6 +103,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 740289485,
"name": "Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
"full_name": "UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
"owner": {
"login": "UserConnecting",
"id": 97047842,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97047842?v=4",
"html_url": "https:\/\/github.com\/UserConnecting",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
"description": "Authentication Bypass Vulnerability Apache OFBiz < 18.12.10.",
"fork": false,
"created_at": "2024-01-08T03:13:43Z",
"updated_at": "2024-04-13T04:19:46Z",
"pushed_at": "2024-01-08T07:03:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 742169705,
"name": "CVE-2023-49070_CVE-2023-51467",

View file

@ -14,10 +14,10 @@
"description": "Apache Solr Backup\/Restore APIs RCE Poc (CVE-2023-50386)",
"fork": false,
"created_at": "2024-02-29T08:57:47Z",
"updated_at": "2024-11-20T16:30:41Z",
"updated_at": "2025-01-17T09:47:42Z",
"pushed_at": "2024-02-29T12:54:56Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 2
}

33
2023/CVE-2023-51073.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 739242348,
"name": "CVE-2023-51073",
"full_name": "christopher-pace\/CVE-2023-51073",
"owner": {
"login": "christopher-pace",
"id": 22531478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4",
"html_url": "https:\/\/github.com\/christopher-pace",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-51073",
"description": "Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03",
"fork": false,
"created_at": "2024-01-05T05:16:18Z",
"updated_at": "2024-01-07T02:12:37Z",
"pushed_at": "2024-01-07T01:40:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

33
2023/CVE-2023-51126.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 737937769,
"name": "CVE-2023-51126",
"full_name": "risuxx\/CVE-2023-51126",
"owner": {
"login": "risuxx",
"id": 47944560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
"html_url": "https:\/\/github.com\/risuxx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51126",
"description": null,
"fork": false,
"created_at": "2024-01-02T02:31:06Z",
"updated_at": "2024-01-03T14:30:50Z",
"pushed_at": "2024-01-02T02:38:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

33
2023/CVE-2023-51127.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 737940013,
"name": "CVE-2023-51127",
"full_name": "risuxx\/CVE-2023-51127",
"owner": {
"login": "risuxx",
"id": 47944560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
"html_url": "https:\/\/github.com\/risuxx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51127",
"description": null,
"fork": false,
"created_at": "2024-01-02T02:43:09Z",
"updated_at": "2024-01-03T14:30:37Z",
"pushed_at": "2024-01-02T02:46:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -216,6 +216,130 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737934166,
"name": "CVE-2023-51385",
"full_name": "WOOOOONG\/CVE-2023-51385",
"owner": {
"login": "WOOOOONG",
"id": 40143329,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4",
"html_url": "https:\/\/github.com\/WOOOOONG",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2023-51385",
"description": "CVE-2023-51385 PoC Exploit ",
"fork": false,
"created_at": "2024-01-02T02:12:35Z",
"updated_at": "2024-07-03T04:28:13Z",
"pushed_at": "2024-01-02T06:48:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 738402073,
"name": "CVE-2023-51385",
"full_name": "uccu99\/CVE-2023-51385",
"owner": {
"login": "uccu99",
"id": 155516921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155516921?v=4",
"html_url": "https:\/\/github.com\/uccu99",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uccu99\/CVE-2023-51385",
"description": null,
"fork": false,
"created_at": "2024-01-03T06:28:34Z",
"updated_at": "2024-01-03T06:28:35Z",
"pushed_at": "2024-01-03T06:28:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 738661198,
"name": "exploit-CVE-2023-51385",
"full_name": "julienbrs\/exploit-CVE-2023-51385",
"owner": {
"login": "julienbrs",
"id": 106234742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
"html_url": "https:\/\/github.com\/julienbrs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julienbrs\/exploit-CVE-2023-51385",
"description": null,
"fork": false,
"created_at": "2024-01-03T18:40:44Z",
"updated_at": "2024-01-03T18:40:44Z",
"pushed_at": "2024-01-03T18:41:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 738669696,
"name": "malicious-exploit-CVE-2023-51385",
"full_name": "julienbrs\/malicious-exploit-CVE-2023-51385",
"owner": {
"login": "julienbrs",
"id": 106234742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
"html_url": "https:\/\/github.com\/julienbrs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julienbrs\/malicious-exploit-CVE-2023-51385",
"description": null,
"fork": false,
"created_at": "2024-01-03T19:08:28Z",
"updated_at": "2024-01-03T19:08:28Z",
"pushed_at": "2024-01-03T20:06:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 741050517,
"name": "CVE-2023-51385",

View file

@ -144,6 +144,68 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 738955975,
"name": "Exploit_CVE-2023-51467",
"full_name": "Subha-BOO7\/Exploit_CVE-2023-51467",
"owner": {
"login": "Subha-BOO7",
"id": 141217634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141217634?v=4",
"html_url": "https:\/\/github.com\/Subha-BOO7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Subha-BOO7\/Exploit_CVE-2023-51467",
"description": null,
"fork": false,
"created_at": "2024-01-04T12:44:43Z",
"updated_at": "2024-01-04T12:51:15Z",
"pushed_at": "2024-01-04T12:45:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 739631896,
"name": "CVE-2023-51467-Exploit",
"full_name": "JaneMandy\/CVE-2023-51467-Exploit",
"owner": {
"login": "JaneMandy",
"id": 36792635,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
"html_url": "https:\/\/github.com\/JaneMandy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JaneMandy\/CVE-2023-51467-Exploit",
"description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
"fork": false,
"created_at": "2024-01-06T04:07:07Z",
"updated_at": "2024-09-05T01:30:59Z",
"pushed_at": "2024-01-06T10:33:34Z",
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},
{
"id": 741082767,
"name": "cve-2023-51467",

View file

@ -93,5 +93,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 739273926,
"name": "CVE-2023-51764",
"full_name": "Double-q1015\/CVE-2023-51764",
"owner": {
"login": "Double-q1015",
"id": 77765134,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77765134?v=4",
"html_url": "https:\/\/github.com\/Double-q1015",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Double-q1015\/CVE-2023-51764",
"description": "CVE-2023-51764 poc",
"fork": false,
"created_at": "2024-01-05T07:07:47Z",
"updated_at": "2024-01-05T07:12:42Z",
"pushed_at": "2024-01-05T07:12:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2023/CVE-2023-7172.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 738005679,
"name": "CVE-2023-7172",
"full_name": "sharathc213\/CVE-2023-7172",
"owner": {
"login": "sharathc213",
"id": 63504490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
"html_url": "https:\/\/github.com\/sharathc213",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7172",
"description": null,
"fork": false,
"created_at": "2024-01-02T07:28:25Z",
"updated_at": "2024-09-07T10:22:34Z",
"pushed_at": "2024-01-02T08:01:27Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

33
2023/CVE-2023-7173.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 738027789,
"name": "CVE-2023-7173",
"full_name": "sharathc213\/CVE-2023-7173",
"owner": {
"login": "sharathc213",
"id": 63504490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
"html_url": "https:\/\/github.com\/sharathc213",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7173",
"description": null,
"fork": false,
"created_at": "2024-01-02T08:41:10Z",
"updated_at": "2024-09-07T10:22:32Z",
"pushed_at": "2024-01-02T08:55:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-19T11:30:25Z",
"updated_at": "2024-12-05T00:53:26Z",
"updated_at": "2025-01-17T10:14:10Z",
"pushed_at": "2024-11-19T11:37:09Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -107,19 +107,19 @@
"description": "CVE-2024-21413 PoC for THM Lab",
"fork": false,
"created_at": "2024-02-17T14:52:52Z",
"updated_at": "2025-01-03T18:59:22Z",
"updated_at": "2025-01-17T11:12:24Z",
"pushed_at": "2024-03-13T02:44:28Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 60,
"forks": 16,
"watchers": 61,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses.",
"fork": false,
"created_at": "2024-03-11T12:28:05Z",
"updated_at": "2025-01-15T11:04:23Z",
"updated_at": "2025-01-17T11:25:57Z",
"pushed_at": "2024-03-25T11:28:23Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -946,6 +946,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

33
2024/CVE-2024-40094.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 918083293,
"name": "CVE-2024-40094",
"full_name": "inpentest\/CVE-2024-40094",
"owner": {
"login": "inpentest",
"id": 56630479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56630479?v=4",
"html_url": "https:\/\/github.com\/inpentest",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/inpentest\/CVE-2024-40094",
"description": "This script exploits the CVE-2024-40094 vulnerability in graphql-java",
"fork": false,
"created_at": "2025-01-17T08:09:37Z",
"updated_at": "2025-01-17T08:29:02Z",
"pushed_at": "2025-01-17T08:21:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -30,6 +30,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,19 +14,50 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-17T05:12:02Z",
"updated_at": "2025-01-17T12:18:16Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 3,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 29,
"forks": 6,
"watchers": 32,
"score": 0,
"subscribers_count": 0
},
{
"id": 918185186,
"name": "CVE-2024-43468_mTLS_go",
"full_name": "nikallass\/CVE-2024-43468_mTLS_go",
"owner": {
"login": "nikallass",
"id": 10115306,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10115306?v=4",
"html_url": "https:\/\/github.com\/nikallass",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nikallass\/CVE-2024-43468_mTLS_go",
"description": "CVE-2024-43468 SCCM SQL Injection Exploit (mTLS version)",
"fork": false,
"created_at": "2025-01-17T12:20:09Z",
"updated_at": "2025-01-17T12:24:24Z",
"pushed_at": "2025-01-17T12:24:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -50,13 +50,13 @@
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 120,
"score": 0,
"subscribers_count": 3

View file

@ -1442,13 +1442,13 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 15,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-17T00:30:51Z",
"updated_at": "2025-01-17T09:02:57Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 447,
"watchers_count": 447,
"stargazers_count": 448,
"watchers_count": 448,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 447,
"watchers": 448,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-17T02:59:00Z",
"updated_at": "2025-01-17T07:12:54Z",
"pushed_at": "2025-01-15T01:01:21Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 142,
"watchers": 144,
"score": 0,
"subscribers_count": 2
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,8 +14,8 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T19:51:01Z",
"updated_at": "2025-01-16T19:57:24Z",
"pushed_at": "2025-01-16T19:57:21Z",
"updated_at": "2025-01-17T10:12:45Z",
"pushed_at": "2025-01-17T10:12:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 918159164,
"name": "CVE-2024-54262",
"full_name": "Nxploited\/CVE-2024-54262",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-54262",
"description": "Exploit CVE-2024-54262: Arbitrary File Upload in Import Export for WooCommerce",
"fork": false,
"created_at": "2025-01-17T11:13:36Z",
"updated_at": "2025-01-17T11:50:07Z",
"pushed_at": "2025-01-17T11:50:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-17T02:26:36Z",
"updated_at": "2025-01-17T10:16:00Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 34,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,7 +28,7 @@
"forks": 11,
"watchers": 36,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 906949463,

View file

@ -28,7 +28,7 @@
"forks": 183,
"watchers": 473,
"score": 0,
"subscribers_count": 5
"subscribers_count": 4
},
{
"id": 822579775,
@ -59,7 +59,7 @@
"forks": 90,
"watchers": 378,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 822584501,

View file

@ -45,10 +45,10 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-16T11:51:34Z",
"updated_at": "2025-01-17T09:43:45Z",
"pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 0
},
@ -138,19 +138,19 @@
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false,
"created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-17T04:05:43Z",
"updated_at": "2025-01-17T10:17:32Z",
"pushed_at": "2025-01-16T15:44:15Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"forks": 6,
"watchers": 12,
"score": 0,
"subscribers_count": 0
},
@ -169,10 +169,10 @@
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"fork": false,
"created_at": "2025-01-16T14:45:53Z",
"updated_at": "2025-01-17T05:55:41Z",
"updated_at": "2025-01-17T11:25:38Z",
"pushed_at": "2025-01-16T20:09:52Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 13,
"watchers": 16,
"score": 0,
"subscribers_count": 0
}

View file

@ -6323,6 +6323,13 @@
### CVE-2024-40080
- [perras/CVE-2024-40080](https://github.com/perras/CVE-2024-40080)
### CVE-2024-40094 (2024-07-30)
<code>GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
</code>
- [inpentest/CVE-2024-40094](https://github.com/inpentest/CVE-2024-40094)
### CVE-2024-40110 (2024-07-12)
<code>Sourcecodester Poultry Farm Management System v1.0 contains an Unauthenticated Remote Code Execution (RCE) vulnerability via the productimage parameter at /farm/product.php.
@ -6796,6 +6803,7 @@
</code>
- [synacktiv/CVE-2024-43468](https://github.com/synacktiv/CVE-2024-43468)
- [nikallass/CVE-2024-43468_mTLS_go](https://github.com/nikallass/CVE-2024-43468_mTLS_go)
### CVE-2024-43532 (2024-10-08)
@ -8192,6 +8200,7 @@
</code>
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
- [Nxploited/CVE-2024-54262](https://github.com/Nxploited/CVE-2024-54262)
### CVE-2024-54292 (2024-12-13)
@ -10081,6 +10090,20 @@
- [soltanali0/CVE-2023-7028](https://github.com/soltanali0/CVE-2023-7028)
- [gh-ost00/CVE-2023-7028](https://github.com/gh-ost00/CVE-2023-7028)
### CVE-2023-7172 (2023-12-30)
<code>Eine kritische Schwachstelle wurde in PHPGurukul Hospital Management System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Admin Dashboard. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [sharathc213/CVE-2023-7172](https://github.com/sharathc213/CVE-2023-7172)
### CVE-2023-7173 (2023-12-30)
<code>Es wurde eine problematische Schwachstelle in PHPGurukul Hospital Management System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei registration.php. Durch das Beeinflussen des Arguments First Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [sharathc213/CVE-2023-7173](https://github.com/sharathc213/CVE-2023-7173)
### CVE-2023-7261 (2024-06-07)
<code>Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High)
@ -10677,6 +10700,7 @@
- [aaaademo/Confluence-EvilJar](https://github.com/aaaademo/Confluence-EvilJar)
- [edsonjt81/CVE-2023-22515-Scan.](https://github.com/edsonjt81/CVE-2023-22515-Scan.)
- [INTfinityConsulting/cve-2023-22515](https://github.com/INTfinityConsulting/cve-2023-22515)
- [CalegariMindSec/Exploit-CVE-2023-22515](https://github.com/CalegariMindSec/Exploit-CVE-2023-22515)
- [rxerium/CVE-2023-22515](https://github.com/rxerium/CVE-2023-22515)
- [fyx1t/NSE--CVE-2023-22515](https://github.com/fyx1t/NSE--CVE-2023-22515)
- [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check)
@ -11091,6 +11115,7 @@
- [H4R335HR/CVE-2023-24329-PoC](https://github.com/H4R335HR/CVE-2023-24329-PoC)
- [Pandante-Central/CVE-2023-24329-codeql-test](https://github.com/Pandante-Central/CVE-2023-24329-codeql-test)
- [PenTestMano/CVE-2023-24329-Exploit](https://github.com/PenTestMano/CVE-2023-24329-Exploit)
### CVE-2023-24488 (2023-07-10)
@ -11533,6 +11558,8 @@
- [Hamibubu/CVE-2023-27163](https://github.com/Hamibubu/CVE-2023-27163)
- [KharimMchatta/basketcraft](https://github.com/KharimMchatta/basketcraft)
- [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163)
- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163)
- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163)
- [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning)
- [btar1gan/exploit_CVE-2023-27163](https://github.com/btar1gan/exploit_CVE-2023-27163)
@ -11772,6 +11799,7 @@
- [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252)
- [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252)
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
- [byt3n33dl3/CLFS](https://github.com/byt3n33dl3/CLFS)
- [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252)
@ -11841,6 +11869,7 @@
- [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432)
- [unam4/CVE-2023-28432-minio_update_rce](https://github.com/unam4/CVE-2023-28432-minio_update_rce)
- [C1ph3rX13/CVE-2023-28432](https://github.com/C1ph3rX13/CVE-2023-28432)
- [netuseradministrator/CVE-2023-28432](https://github.com/netuseradministrator/CVE-2023-28432)
- [xk-mt/CVE-2023-28432](https://github.com/xk-mt/CVE-2023-28432)
- [0xRulez/CVE-2023-28432](https://github.com/0xRulez/CVE-2023-28432)
@ -11961,6 +11990,7 @@
- [LuemmelSec/CVE-2023-29357](https://github.com/LuemmelSec/CVE-2023-29357)
- [KeyStrOke95/CVE-2023-29357-ExE](https://github.com/KeyStrOke95/CVE-2023-29357-ExE)
- [Guillaume-Risch/cve-2023-29357-Sharepoint](https://github.com/Guillaume-Risch/cve-2023-29357-Sharepoint)
- [Jev1337/CVE-2023-29357-Check](https://github.com/Jev1337/CVE-2023-29357-Check)
- [AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357](https://github.com/AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357)
### CVE-2023-29360 (2023-06-13)
@ -12369,6 +12399,13 @@
- [Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure](https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure)
### CVE-2023-31446 (2024-01-10)
<code>In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
</code>
- [Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution](https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution)
### CVE-2023-31497 (2023-05-11)
<code>Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows attackers to escalate privileges to root via supplying a crafted binary to the target system.
@ -13135,6 +13172,7 @@
- [Malwareman007/CVE-2023-34362](https://github.com/Malwareman007/CVE-2023-34362)
- [toorandom/moveit-payload-decrypt-CVE-2023-34362](https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362)
- [errorfiathck/MOVEit-Exploit](https://github.com/errorfiathck/MOVEit-Exploit)
- [Chinyemba-ck/MOVEit-CVE-2023-34362](https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362)
- [glen-pearson/MoveIT-CVE-2023-34362-RCE](https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE)
- [aditibv/MOVEit-CVE-2023-34362](https://github.com/aditibv/MOVEit-CVE-2023-34362)
@ -13991,6 +14029,7 @@
- [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408)
- [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408)
- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408)
- [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408)
- [mrtacojr/CVE-2023-38408](https://github.com/mrtacojr/CVE-2023-38408)
- [fazilbaig1/cve_2023_38408_scanner](https://github.com/fazilbaig1/cve_2023_38408_scanner)
@ -14101,6 +14140,7 @@
- [Shisones/MetabaseRCE_CVE-2023-38646](https://github.com/Shisones/MetabaseRCE_CVE-2023-38646)
- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
- [DaniTheHack3r/CVE-2023-38646](https://github.com/DaniTheHack3r/CVE-2023-38646)
- [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc)
- [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase)
@ -14396,6 +14436,13 @@
- [kenbuckler/WS_FTP-CVE-2023-40044](https://github.com/kenbuckler/WS_FTP-CVE-2023-40044)
### CVE-2023-40084 (2023-12-04)
<code>In run of MDnsSdListener.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
</code>
- [Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084](https://github.com/Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084)
### CVE-2023-40109 (2024-02-15)
<code>In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
@ -16304,6 +16351,15 @@
- [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974)
### CVE-2023-48981
- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981)
### CVE-2023-48982
- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982)
### CVE-2023-48983
- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983)
### CVE-2023-49002 (2023-12-27)
<code>An issue in Xenom Technologies (sinous) Phone Dialer-voice Call Dialer v.1.2.5 allows an attacker to bypass intended access restrictions via interaction with com.funprime.calldialer.ui.activities.OutgoingActivity.
@ -16340,6 +16396,7 @@
- [abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC](https://github.com/abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC)
- [0xrobiul/CVE-2023-49070](https://github.com/0xrobiul/CVE-2023-49070)
- [D0g3-8Bit/OFBiz-Attack](https://github.com/D0g3-8Bit/OFBiz-Attack)
- [UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz](https://github.com/UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz)
- [yukselberkay/CVE-2023-49070_CVE-2023-51467](https://github.com/yukselberkay/CVE-2023-49070_CVE-2023-51467)
- [Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467](https://github.com/Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467)
@ -16794,9 +16851,30 @@
### CVE-2023-51000
- [Team-Byerus/CVE-2023-51000](https://github.com/Team-Byerus/CVE-2023-51000)
### CVE-2023-51073 (2024-01-11)
<code>An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh.
</code>
- [christopher-pace/CVE-2023-51073](https://github.com/christopher-pace/CVE-2023-51073)
### CVE-2023-51119
- [OscarAkaElvis/CVE-2023-51119](https://github.com/OscarAkaElvis/CVE-2023-51119)
### CVE-2023-51126 (2024-01-10)
<code>Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter.
</code>
- [risuxx/CVE-2023-51126](https://github.com/risuxx/CVE-2023-51126)
### CVE-2023-51127 (2024-01-10)
<code>FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file.
</code>
- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127)
### CVE-2023-51214
- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
@ -16819,6 +16897,10 @@
- [LtmThink/CVE-2023-51385_test](https://github.com/LtmThink/CVE-2023-51385_test)
- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
- [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test)
- [WOOOOONG/CVE-2023-51385](https://github.com/WOOOOONG/CVE-2023-51385)
- [uccu99/CVE-2023-51385](https://github.com/uccu99/CVE-2023-51385)
- [julienbrs/exploit-CVE-2023-51385](https://github.com/julienbrs/exploit-CVE-2023-51385)
- [julienbrs/malicious-exploit-CVE-2023-51385](https://github.com/julienbrs/malicious-exploit-CVE-2023-51385)
- [Sonicrrrr/CVE-2023-51385](https://github.com/Sonicrrrr/CVE-2023-51385)
- [farliy-hacker/CVE-2023-51385](https://github.com/farliy-hacker/CVE-2023-51385)
- [farliy-hacker/CVE-2023-51385-save](https://github.com/farliy-hacker/CVE-2023-51385-save)
@ -16855,6 +16937,8 @@
- [Chocapikk/CVE-2023-51467](https://github.com/Chocapikk/CVE-2023-51467)
- [K3ysTr0K3R/CVE-2023-51467-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-51467-EXPLOIT)
- [jakabakos/Apache-OFBiz-Authentication-Bypass](https://github.com/jakabakos/Apache-OFBiz-Authentication-Bypass)
- [Subha-BOO7/Exploit_CVE-2023-51467](https://github.com/Subha-BOO7/Exploit_CVE-2023-51467)
- [JaneMandy/CVE-2023-51467-Exploit](https://github.com/JaneMandy/CVE-2023-51467-Exploit)
- [vulncheck-oss/cve-2023-51467](https://github.com/vulncheck-oss/cve-2023-51467)
- [2ptr/BadBizness-CVE-2023-51467](https://github.com/2ptr/BadBizness-CVE-2023-51467)
- [AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-](https://github.com/AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-)
@ -16881,6 +16965,7 @@
- [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764)
- [eeenvik1/CVE-2023-51764](https://github.com/eeenvik1/CVE-2023-51764)
- [d4op/CVE-2023-51764-POC](https://github.com/d4op/CVE-2023-51764-POC)
- [Double-q1015/CVE-2023-51764](https://github.com/Double-q1015/CVE-2023-51764)
### CVE-2023-51800 (2024-02-29)
@ -33971,6 +34056,7 @@
- [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882)
- [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC)
- [AleksaZatezalo/CVE-2020-14882](https://github.com/AleksaZatezalo/CVE-2020-14882)
- [KKC73/weblogic-cve-2020-14882](https://github.com/KKC73/weblogic-cve-2020-14882)
### CVE-2020-14883 (2020-10-21)