mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 10:04:09 +01:00
Auto Update 2025/01/17 12:32:28
This commit is contained in:
parent
4cc2c2e408
commit
8ac38987b1
66 changed files with 1256 additions and 156 deletions
|
@ -246,13 +246,13 @@
|
|||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"has_discussions": false,
|
||||
"forks_count": 145,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 145,
|
||||
"forks": 146,
|
||||
"watchers": 493,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
|
|
@ -417,10 +417,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2025-01-17T03:21:16Z",
|
||||
"updated_at": "2025-01-17T08:44:37Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -437,7 +437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 176,
|
||||
"watchers": 178,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2024-12-27T03:05:22Z",
|
||||
"updated_at": "2025-01-17T09:27:03Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 758,
|
||||
"watchers_count": 758,
|
||||
"stargazers_count": 759,
|
||||
"watchers_count": 759,
|
||||
"has_discussions": false,
|
||||
"forks_count": 168,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 168,
|
||||
"watchers": 758,
|
||||
"watchers": 759,
|
||||
"score": 0,
|
||||
"subscribers_count": 41
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2025-01-17T02:08:32Z",
|
||||
"updated_at": "2025-01-17T07:31:00Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 224,
|
||||
"watchers": 225,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -375,10 +375,10 @@
|
|||
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T15:38:15Z",
|
||||
"updated_at": "2024-12-11T14:22:18Z",
|
||||
"updated_at": "2025-01-17T06:25:29Z",
|
||||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"has_discussions": false,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
|
@ -387,7 +387,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2025-01-06T03:02:21Z",
|
||||
"updated_at": "2025-01-17T06:27:10Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"has_discussions": false,
|
||||
"forks_count": 191,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 191,
|
||||
"watchers": 495,
|
||||
"watchers": 496,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2025-01-13T08:49:52Z",
|
||||
"updated_at": "2025-01-17T06:23:10Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1801,
|
||||
"watchers_count": 1801,
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
"has_discussions": false,
|
||||
"forks_count": 249,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 249,
|
||||
"watchers": 1801,
|
||||
"watchers": 1802,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "php-fpm+Nginx RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T23:26:57Z",
|
||||
"updated_at": "2024-12-16T11:23:42Z",
|
||||
"updated_at": "2025-01-17T06:23:00Z",
|
||||
"pushed_at": "2020-08-20T04:43:25Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2025-01-08T16:50:27Z",
|
||||
"updated_at": "2025-01-17T07:50:12Z",
|
||||
"pushed_at": "2024-06-16T15:35:20Z",
|
||||
"stargazers_count": 951,
|
||||
"watchers_count": 951,
|
||||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"has_discussions": false,
|
||||
"forks_count": 176,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 176,
|
||||
"watchers": 951,
|
||||
"watchers": 952,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -65,10 +65,10 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2024-12-03T03:14:00Z",
|
||||
"updated_at": "2025-01-17T09:53:36Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
|
@ -77,7 +77,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -1016,5 +1016,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918084911,
|
||||
"name": "weblogic-cve-2020-14882",
|
||||
"full_name": "KKC73\/weblogic-cve-2020-14882",
|
||||
"owner": {
|
||||
"login": "KKC73",
|
||||
"id": 50138914,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50138914?v=4",
|
||||
"html_url": "https:\/\/github.com\/KKC73",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KKC73\/weblogic-cve-2020-14882",
|
||||
"description": "This is a repository that aims to provide research material on CVE-2020-14882 as part of a project in partial fullfilment of ACS EDU Program.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T08:13:39Z",
|
||||
"updated_at": "2025-01-17T08:15:24Z",
|
||||
"pushed_at": "2025-01-17T08:15:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -386,10 +386,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2024-12-15T13:01:38Z",
|
||||
"updated_at": "2025-01-17T07:49:43Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -404,7 +404,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 369,
|
||||
"watchers": 370,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -981,10 +981,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2025-01-17T03:21:16Z",
|
||||
"updated_at": "2025-01-17T08:44:37Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -1001,7 +1001,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 176,
|
||||
"watchers": 178,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2025-01-16T06:34:05Z",
|
||||
"updated_at": "2025-01-17T08:04:47Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1856,
|
||||
"watchers_count": 1856,
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"has_discussions": false,
|
||||
"forks_count": 585,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 585,
|
||||
"watchers": 1856,
|
||||
"watchers": 1857,
|
||||
"score": 0,
|
||||
"subscribers_count": 43
|
||||
},
|
||||
|
|
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2025-01-16T10:30:47Z",
|
||||
"updated_at": "2025-01-17T07:55:13Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"stargazers_count": 1368,
|
||||
"watchers_count": 1368,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1367,
|
||||
"watchers": 1368,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -1307,10 +1307,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2025-01-15T09:32:37Z",
|
||||
"updated_at": "2025-01-17T10:00:13Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 811,
|
||||
"watchers_count": 811,
|
||||
"stargazers_count": 812,
|
||||
"watchers_count": 812,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -1324,7 +1324,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 811,
|
||||
"watchers": 812,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2025-01-15T07:40:15Z",
|
||||
"updated_at": "2025-01-17T07:44:07Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC of CVE-2022-20474",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-14T08:48:59Z",
|
||||
"updated_at": "2024-12-01T14:56:17Z",
|
||||
"updated_at": "2025-01-17T11:42:27Z",
|
||||
"pushed_at": "2024-12-01T14:56:14Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2025-01-16T10:30:47Z",
|
||||
"updated_at": "2025-01-17T07:55:13Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"stargazers_count": 1368,
|
||||
"watchers_count": 1368,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1367,
|
||||
"watchers": 1368,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -332,10 +332,10 @@
|
|||
"description": "CobaltStrike <= 4.7.1 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T11:46:01Z",
|
||||
"updated_at": "2025-01-11T06:37:47Z",
|
||||
"updated_at": "2025-01-17T09:16:07Z",
|
||||
"pushed_at": "2022-10-25T05:32:54Z",
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
|
@ -344,7 +344,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 378,
|
||||
"watchers": 379,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2025-01-16T13:12:41Z",
|
||||
"updated_at": "2025-01-17T09:19:33Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 342,
|
||||
"watchers": 343,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -743,19 +743,19 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-17T04:41:20Z",
|
||||
"updated_at": "2025-01-17T11:03:19Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 33,
|
||||
"forks": 15,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -593,6 +593,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 738213429,
|
||||
"name": "Exploit-CVE-2023-22515",
|
||||
"full_name": "CalegariMindSec\/Exploit-CVE-2023-22515",
|
||||
"owner": {
|
||||
"login": "CalegariMindSec",
|
||||
"id": 68512056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512056?v=4",
|
||||
"html_url": "https:\/\/github.com\/CalegariMindSec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CalegariMindSec\/Exploit-CVE-2023-22515",
|
||||
"description": "A simple exploit for CVE-2023-22515",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T17:40:24Z",
|
||||
"updated_at": "2024-01-02T23:11:04Z",
|
||||
"pushed_at": "2024-01-02T23:15:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 762759550,
|
||||
"name": "CVE-2023-22515",
|
||||
|
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 795324648,
|
||||
"name": "CVE-2023-24329-Exploit",
|
||||
"full_name": "PenTestMano\/CVE-2023-24329-Exploit",
|
||||
"owner": {
|
||||
"login": "PenTestMano",
|
||||
"id": 162714784,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162714784?v=4",
|
||||
"html_url": "https:\/\/github.com\/PenTestMano",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PenTestMano\/CVE-2023-24329-Exploit",
|
||||
"description": "Example of CVE-2023-24329 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-03T03:16:02Z",
|
||||
"updated_at": "2024-05-03T03:16:02Z",
|
||||
"pushed_at": "2023-10-13T07:42:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -417,6 +417,68 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 739001610,
|
||||
"name": "CVE-2023-27163",
|
||||
"full_name": "Rubioo02\/CVE-2023-27163",
|
||||
"owner": {
|
||||
"login": "Rubioo02",
|
||||
"id": 153825296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153825296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rubioo02",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rubioo02\/CVE-2023-27163",
|
||||
"description": "A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-04T14:46:13Z",
|
||||
"updated_at": "2024-01-04T17:04:49Z",
|
||||
"pushed_at": "2024-01-04T16:40:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 739760866,
|
||||
"name": "CVE-2023-27163",
|
||||
"full_name": "madhavmehndiratta\/CVE-2023-27163",
|
||||
"owner": {
|
||||
"login": "madhavmehndiratta",
|
||||
"id": 43489174,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43489174?v=4",
|
||||
"html_url": "https:\/\/github.com\/madhavmehndiratta",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/madhavmehndiratta\/CVE-2023-27163",
|
||||
"description": "PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-06T13:16:29Z",
|
||||
"updated_at": "2024-01-06T15:53:16Z",
|
||||
"pushed_at": "2024-01-06T15:52:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 820848497,
|
||||
"name": "CVE-2023-27163-ssrf-to-port-scanning",
|
||||
|
|
|
@ -92,6 +92,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 737810016,
|
||||
"name": "Compiled-PoC-Binary-For-CVE-2023-28252",
|
||||
"full_name": "bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
|
||||
"owner": {
|
||||
"login": "bkstephen",
|
||||
"id": 8013595,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8013595?v=4",
|
||||
"html_url": "https:\/\/github.com\/bkstephen",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
|
||||
"description": "The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T15:30:33Z",
|
||||
"updated_at": "2024-06-21T07:22:21Z",
|
||||
"pushed_at": "2024-01-01T15:39:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 746601760,
|
||||
"name": "CVE-2023-28252-Compiled-exe",
|
||||
|
|
|
@ -498,6 +498,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 740067240,
|
||||
"name": "CVE-2023-28432",
|
||||
"full_name": "netuseradministrator\/CVE-2023-28432",
|
||||
"owner": {
|
||||
"login": "netuseradministrator",
|
||||
"id": 96680088,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96680088?v=4",
|
||||
"html_url": "https:\/\/github.com\/netuseradministrator",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/netuseradministrator\/CVE-2023-28432",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-07T12:34:49Z",
|
||||
"updated_at": "2024-01-31T02:25:36Z",
|
||||
"pushed_at": "2024-01-07T15:20:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 741968176,
|
||||
"name": "CVE-2023-28432",
|
||||
|
|
|
@ -130,6 +130,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 737886117,
|
||||
"name": "CVE-2023-29357-Check",
|
||||
"full_name": "Jev1337\/CVE-2023-29357-Check",
|
||||
"owner": {
|
||||
"login": "Jev1337",
|
||||
"id": 19759761,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19759761?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jev1337",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jev1337\/CVE-2023-29357-Check",
|
||||
"description": "A Python script that verifies whether a target is vulnerable to CVE-2023-29357 or not",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T21:08:22Z",
|
||||
"updated_at": "2024-11-06T09:07:45Z",
|
||||
"pushed_at": "2024-01-01T21:13:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 856513093,
|
||||
"name": "Event-ID-189-Rule-Name-SOC227-CVE-2023-29357",
|
||||
|
|
33
2023/CVE-2023-31446.json
Normal file
33
2023/CVE-2023-31446.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 739746679,
|
||||
"name": "CVE-2023-31446-Remote-Code-Execution",
|
||||
"full_name": "Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution",
|
||||
"owner": {
|
||||
"login": "Dodge-MPTC",
|
||||
"id": 75072113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75072113?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dodge-MPTC",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution",
|
||||
"description": "Repository contains description for CVE-2023-31446",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-06T12:23:50Z",
|
||||
"updated_at": "2024-01-09T09:34:42Z",
|
||||
"pushed_at": "2024-01-06T12:57:49Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -233,6 +233,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 737660313,
|
||||
"name": "MOVEit-CVE-2023-34362",
|
||||
"full_name": "Chinyemba-ck\/MOVEit-CVE-2023-34362",
|
||||
"owner": {
|
||||
"login": "Chinyemba-ck",
|
||||
"id": 85675608,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85675608?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chinyemba-ck",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chinyemba-ck\/MOVEit-CVE-2023-34362",
|
||||
"description": "A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T00:55:07Z",
|
||||
"updated_at": "2024-01-01T00:55:07Z",
|
||||
"pushed_at": "2024-01-01T00:56:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 821497009,
|
||||
"name": "MoveIT-CVE-2023-34362-RCE",
|
||||
|
|
|
@ -67,6 +67,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 739947067,
|
||||
"name": "CVE-2023-38408",
|
||||
"full_name": "classic130\/CVE-2023-38408",
|
||||
"owner": {
|
||||
"login": "classic130",
|
||||
"id": 69665702,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69665702?v=4",
|
||||
"html_url": "https:\/\/github.com\/classic130",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/classic130\/CVE-2023-38408",
|
||||
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-07T03:03:06Z",
|
||||
"updated_at": "2024-09-08T06:41:32Z",
|
||||
"pushed_at": "2023-07-25T22:16:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 758630242,
|
||||
"name": "CVE-2023-38408",
|
||||
|
|
|
@ -1099,6 +1099,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 767222866,
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "DaniTheHack3r\/CVE-2023-38646",
|
||||
"owner": {
|
||||
"login": "DaniTheHack3r",
|
||||
"id": 51076007,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51076007?v=4",
|
||||
"html_url": "https:\/\/github.com\/DaniTheHack3r",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DaniTheHack3r\/CVE-2023-38646",
|
||||
"description": "CVE-2023-38646 Metabase 0.46.6 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-04T23:01:43Z",
|
||||
"updated_at": "2024-03-04T23:01:48Z",
|
||||
"pushed_at": "2023-10-11T15:26:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 892415497,
|
||||
"name": "cve-2023-38646-poc",
|
||||
|
|
33
2023/CVE-2023-40084.json
Normal file
33
2023/CVE-2023-40084.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 739336852,
|
||||
"name": "platform_system_netd_AOSP10_r33_CVE-2023-40084",
|
||||
"full_name": "Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-05T10:20:57Z",
|
||||
"updated_at": "2024-01-05T10:22:41Z",
|
||||
"pushed_at": "2024-01-05T10:23:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Proof of concept for DoS exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T01:59:47Z",
|
||||
"updated_at": "2024-10-11T01:41:10Z",
|
||||
"updated_at": "2025-01-17T07:24:59Z",
|
||||
"pushed_at": "2023-10-13T11:19:10Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -65,7 +65,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-17T04:44:33Z",
|
||||
"updated_at": "2025-01-17T11:20:55Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1389,
|
||||
"watchers_count": 1389,
|
||||
|
|
33
2023/CVE-2023-48981.json
Normal file
33
2023/CVE-2023-48981.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 737775658,
|
||||
"name": "CVE-2023-48981",
|
||||
"full_name": "tristao-marinho\/CVE-2023-48981",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981",
|
||||
"description": "POC CVE-2023-48981",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T13:06:39Z",
|
||||
"updated_at": "2024-01-01T13:06:40Z",
|
||||
"pushed_at": "2024-01-01T13:18:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2023/CVE-2023-48982.json
Normal file
33
2023/CVE-2023-48982.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 737777512,
|
||||
"name": "CVE-2023-48982",
|
||||
"full_name": "tristao-marinho\/CVE-2023-48982",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982",
|
||||
"description": "POC CVE-2023-48982",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T13:14:49Z",
|
||||
"updated_at": "2024-01-01T13:14:49Z",
|
||||
"pushed_at": "2024-01-01T13:17:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2023/CVE-2023-48983.json
Normal file
33
2023/CVE-2023-48983.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 737778720,
|
||||
"name": "CVE-2023-48983",
|
||||
"full_name": "tristao-marinho\/CVE-2023-48983",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983",
|
||||
"description": "POC CVE-2023-48983",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T13:19:54Z",
|
||||
"updated_at": "2024-01-02T12:18:35Z",
|
||||
"pushed_at": "2024-01-01T13:23:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -103,6 +103,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 740289485,
|
||||
"name": "Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
|
||||
"full_name": "UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
|
||||
"owner": {
|
||||
"login": "UserConnecting",
|
||||
"id": 97047842,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97047842?v=4",
|
||||
"html_url": "https:\/\/github.com\/UserConnecting",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
|
||||
"description": "Authentication Bypass Vulnerability Apache OFBiz < 18.12.10.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-08T03:13:43Z",
|
||||
"updated_at": "2024-04-13T04:19:46Z",
|
||||
"pushed_at": "2024-01-08T07:03:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 742169705,
|
||||
"name": "CVE-2023-49070_CVE-2023-51467",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache Solr Backup\/Restore APIs RCE Poc (CVE-2023-50386)",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-29T08:57:47Z",
|
||||
"updated_at": "2024-11-20T16:30:41Z",
|
||||
"updated_at": "2025-01-17T09:47:42Z",
|
||||
"pushed_at": "2024-02-29T12:54:56Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
33
2023/CVE-2023-51073.json
Normal file
33
2023/CVE-2023-51073.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 739242348,
|
||||
"name": "CVE-2023-51073",
|
||||
"full_name": "christopher-pace\/CVE-2023-51073",
|
||||
"owner": {
|
||||
"login": "christopher-pace",
|
||||
"id": 22531478,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4",
|
||||
"html_url": "https:\/\/github.com\/christopher-pace",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-51073",
|
||||
"description": "Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-05T05:16:18Z",
|
||||
"updated_at": "2024-01-07T02:12:37Z",
|
||||
"pushed_at": "2024-01-07T01:40:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
33
2023/CVE-2023-51126.json
Normal file
33
2023/CVE-2023-51126.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 737937769,
|
||||
"name": "CVE-2023-51126",
|
||||
"full_name": "risuxx\/CVE-2023-51126",
|
||||
"owner": {
|
||||
"login": "risuxx",
|
||||
"id": 47944560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
|
||||
"html_url": "https:\/\/github.com\/risuxx",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51126",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T02:31:06Z",
|
||||
"updated_at": "2024-01-03T14:30:50Z",
|
||||
"pushed_at": "2024-01-02T02:38:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2023/CVE-2023-51127.json
Normal file
33
2023/CVE-2023-51127.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 737940013,
|
||||
"name": "CVE-2023-51127",
|
||||
"full_name": "risuxx\/CVE-2023-51127",
|
||||
"owner": {
|
||||
"login": "risuxx",
|
||||
"id": 47944560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
|
||||
"html_url": "https:\/\/github.com\/risuxx",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51127",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T02:43:09Z",
|
||||
"updated_at": "2024-01-03T14:30:37Z",
|
||||
"pushed_at": "2024-01-02T02:46:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -216,6 +216,130 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 737934166,
|
||||
"name": "CVE-2023-51385",
|
||||
"full_name": "WOOOOONG\/CVE-2023-51385",
|
||||
"owner": {
|
||||
"login": "WOOOOONG",
|
||||
"id": 40143329,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4",
|
||||
"html_url": "https:\/\/github.com\/WOOOOONG",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2023-51385",
|
||||
"description": "CVE-2023-51385 PoC Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T02:12:35Z",
|
||||
"updated_at": "2024-07-03T04:28:13Z",
|
||||
"pushed_at": "2024-01-02T06:48:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 738402073,
|
||||
"name": "CVE-2023-51385",
|
||||
"full_name": "uccu99\/CVE-2023-51385",
|
||||
"owner": {
|
||||
"login": "uccu99",
|
||||
"id": 155516921,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155516921?v=4",
|
||||
"html_url": "https:\/\/github.com\/uccu99",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uccu99\/CVE-2023-51385",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-03T06:28:34Z",
|
||||
"updated_at": "2024-01-03T06:28:35Z",
|
||||
"pushed_at": "2024-01-03T06:28:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 738661198,
|
||||
"name": "exploit-CVE-2023-51385",
|
||||
"full_name": "julienbrs\/exploit-CVE-2023-51385",
|
||||
"owner": {
|
||||
"login": "julienbrs",
|
||||
"id": 106234742,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
|
||||
"html_url": "https:\/\/github.com\/julienbrs",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/julienbrs\/exploit-CVE-2023-51385",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-03T18:40:44Z",
|
||||
"updated_at": "2024-01-03T18:40:44Z",
|
||||
"pushed_at": "2024-01-03T18:41:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 738669696,
|
||||
"name": "malicious-exploit-CVE-2023-51385",
|
||||
"full_name": "julienbrs\/malicious-exploit-CVE-2023-51385",
|
||||
"owner": {
|
||||
"login": "julienbrs",
|
||||
"id": 106234742,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
|
||||
"html_url": "https:\/\/github.com\/julienbrs",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/julienbrs\/malicious-exploit-CVE-2023-51385",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-03T19:08:28Z",
|
||||
"updated_at": "2024-01-03T19:08:28Z",
|
||||
"pushed_at": "2024-01-03T20:06:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 741050517,
|
||||
"name": "CVE-2023-51385",
|
||||
|
|
|
@ -144,6 +144,68 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 738955975,
|
||||
"name": "Exploit_CVE-2023-51467",
|
||||
"full_name": "Subha-BOO7\/Exploit_CVE-2023-51467",
|
||||
"owner": {
|
||||
"login": "Subha-BOO7",
|
||||
"id": 141217634,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141217634?v=4",
|
||||
"html_url": "https:\/\/github.com\/Subha-BOO7",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Subha-BOO7\/Exploit_CVE-2023-51467",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-04T12:44:43Z",
|
||||
"updated_at": "2024-01-04T12:51:15Z",
|
||||
"pushed_at": "2024-01-04T12:45:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 739631896,
|
||||
"name": "CVE-2023-51467-Exploit",
|
||||
"full_name": "JaneMandy\/CVE-2023-51467-Exploit",
|
||||
"owner": {
|
||||
"login": "JaneMandy",
|
||||
"id": 36792635,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
|
||||
"html_url": "https:\/\/github.com\/JaneMandy",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JaneMandy\/CVE-2023-51467-Exploit",
|
||||
"description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-06T04:07:07Z",
|
||||
"updated_at": "2024-09-05T01:30:59Z",
|
||||
"pushed_at": "2024-01-06T10:33:34Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 741082767,
|
||||
"name": "cve-2023-51467",
|
||||
|
|
|
@ -93,5 +93,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 739273926,
|
||||
"name": "CVE-2023-51764",
|
||||
"full_name": "Double-q1015\/CVE-2023-51764",
|
||||
"owner": {
|
||||
"login": "Double-q1015",
|
||||
"id": 77765134,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77765134?v=4",
|
||||
"html_url": "https:\/\/github.com\/Double-q1015",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Double-q1015\/CVE-2023-51764",
|
||||
"description": "CVE-2023-51764 poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-05T07:07:47Z",
|
||||
"updated_at": "2024-01-05T07:12:42Z",
|
||||
"pushed_at": "2024-01-05T07:12:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2023/CVE-2023-7172.json
Normal file
33
2023/CVE-2023-7172.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 738005679,
|
||||
"name": "CVE-2023-7172",
|
||||
"full_name": "sharathc213\/CVE-2023-7172",
|
||||
"owner": {
|
||||
"login": "sharathc213",
|
||||
"id": 63504490,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
|
||||
"html_url": "https:\/\/github.com\/sharathc213",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7172",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T07:28:25Z",
|
||||
"updated_at": "2024-09-07T10:22:34Z",
|
||||
"pushed_at": "2024-01-02T08:01:27Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2023/CVE-2023-7173.json
Normal file
33
2023/CVE-2023-7173.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 738027789,
|
||||
"name": "CVE-2023-7173",
|
||||
"full_name": "sharathc213\/CVE-2023-7173",
|
||||
"owner": {
|
||||
"login": "sharathc213",
|
||||
"id": 63504490,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
|
||||
"html_url": "https:\/\/github.com\/sharathc213",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7173",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T08:41:10Z",
|
||||
"updated_at": "2024-09-07T10:22:32Z",
|
||||
"pushed_at": "2024-01-02T08:55:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T11:30:25Z",
|
||||
"updated_at": "2024-12-05T00:53:26Z",
|
||||
"updated_at": "2025-01-17T10:14:10Z",
|
||||
"pushed_at": "2024-11-19T11:37:09Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -107,19 +107,19 @@
|
|||
"description": "CVE-2024-21413 PoC for THM Lab",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-17T14:52:52Z",
|
||||
"updated_at": "2025-01-03T18:59:22Z",
|
||||
"updated_at": "2025-01-17T11:12:24Z",
|
||||
"pushed_at": "2024-03-13T02:44:28Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 60,
|
||||
"forks": 16,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T12:28:05Z",
|
||||
"updated_at": "2025-01-15T11:04:23Z",
|
||||
"updated_at": "2025-01-17T11:25:57Z",
|
||||
"pushed_at": "2024-03-25T11:28:23Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -946,6 +946,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2024/CVE-2024-40094.json
Normal file
33
2024/CVE-2024-40094.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918083293,
|
||||
"name": "CVE-2024-40094",
|
||||
"full_name": "inpentest\/CVE-2024-40094",
|
||||
"owner": {
|
||||
"login": "inpentest",
|
||||
"id": 56630479,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56630479?v=4",
|
||||
"html_url": "https:\/\/github.com\/inpentest",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/inpentest\/CVE-2024-40094",
|
||||
"description": "This script exploits the CVE-2024-40094 vulnerability in graphql-java",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T08:09:37Z",
|
||||
"updated_at": "2025-01-17T08:29:02Z",
|
||||
"pushed_at": "2025-01-17T08:21:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -30,6 +30,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,19 +14,50 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-17T05:12:02Z",
|
||||
"updated_at": "2025-01-17T12:18:16Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 29,
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 918185186,
|
||||
"name": "CVE-2024-43468_mTLS_go",
|
||||
"full_name": "nikallass\/CVE-2024-43468_mTLS_go",
|
||||
"owner": {
|
||||
"login": "nikallass",
|
||||
"id": 10115306,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10115306?v=4",
|
||||
"html_url": "https:\/\/github.com\/nikallass",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nikallass\/CVE-2024-43468_mTLS_go",
|
||||
"description": "CVE-2024-43468 SCCM SQL Injection Exploit (mTLS version)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T12:20:09Z",
|
||||
"updated_at": "2025-01-17T12:24:24Z",
|
||||
"pushed_at": "2025-01-17T12:24:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -1442,13 +1442,13 @@
|
|||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T15:48:38Z",
|
||||
"updated_at": "2025-01-17T00:30:51Z",
|
||||
"updated_at": "2025-01-17T09:02:57Z",
|
||||
"pushed_at": "2025-01-02T16:07:23Z",
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"stargazers_count": 448,
|
||||
"watchers_count": 448,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 447,
|
||||
"watchers": 448,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC exploit for CVE-2024-49138",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T00:43:37Z",
|
||||
"updated_at": "2025-01-17T02:59:00Z",
|
||||
"updated_at": "2025-01-17T07:12:54Z",
|
||||
"pushed_at": "2025-01-15T01:01:21Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 142,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T19:51:01Z",
|
||||
"updated_at": "2025-01-16T19:57:24Z",
|
||||
"pushed_at": "2025-01-16T19:57:21Z",
|
||||
"updated_at": "2025-01-17T10:12:45Z",
|
||||
"pushed_at": "2025-01-17T10:12:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918159164,
|
||||
"name": "CVE-2024-54262",
|
||||
"full_name": "Nxploited\/CVE-2024-54262",
|
||||
"owner": {
|
||||
"login": "Nxploited",
|
||||
"id": 188819918,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nxploited",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-54262",
|
||||
"description": "Exploit CVE-2024-54262: Arbitrary File Upload in Import Export for WooCommerce",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T11:13:36Z",
|
||||
"updated_at": "2025-01-17T11:50:07Z",
|
||||
"pushed_at": "2025-01-17T11:50:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T07:26:15Z",
|
||||
"updated_at": "2025-01-17T02:26:36Z",
|
||||
"updated_at": "2025-01-17T10:16:00Z",
|
||||
"pushed_at": "2025-01-16T08:58:49Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 11,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 906949463,
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 183,
|
||||
"watchers": 473,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 822579775,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"forks": 90,
|
||||
"watchers": 378,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 822584501,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T02:06:51Z",
|
||||
"updated_at": "2025-01-16T11:51:34Z",
|
||||
"updated_at": "2025-01-17T09:43:45Z",
|
||||
"pushed_at": "2025-01-11T23:54:06Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -138,19 +138,19 @@
|
|||
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T18:27:12Z",
|
||||
"updated_at": "2025-01-17T04:05:43Z",
|
||||
"updated_at": "2025-01-17T10:17:32Z",
|
||||
"pushed_at": "2025-01-16T15:44:15Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -169,10 +169,10 @@
|
|||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T14:45:53Z",
|
||||
"updated_at": "2025-01-17T05:55:41Z",
|
||||
"updated_at": "2025-01-17T11:25:38Z",
|
||||
"pushed_at": "2025-01-16T20:09:52Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 13,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
86
README.md
86
README.md
|
@ -6323,6 +6323,13 @@
|
|||
### CVE-2024-40080
|
||||
- [perras/CVE-2024-40080](https://github.com/perras/CVE-2024-40080)
|
||||
|
||||
### CVE-2024-40094 (2024-07-30)
|
||||
|
||||
<code>GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
|
||||
</code>
|
||||
|
||||
- [inpentest/CVE-2024-40094](https://github.com/inpentest/CVE-2024-40094)
|
||||
|
||||
### CVE-2024-40110 (2024-07-12)
|
||||
|
||||
<code>Sourcecodester Poultry Farm Management System v1.0 contains an Unauthenticated Remote Code Execution (RCE) vulnerability via the productimage parameter at /farm/product.php.
|
||||
|
@ -6796,6 +6803,7 @@
|
|||
</code>
|
||||
|
||||
- [synacktiv/CVE-2024-43468](https://github.com/synacktiv/CVE-2024-43468)
|
||||
- [nikallass/CVE-2024-43468_mTLS_go](https://github.com/nikallass/CVE-2024-43468_mTLS_go)
|
||||
|
||||
### CVE-2024-43532 (2024-10-08)
|
||||
|
||||
|
@ -8192,6 +8200,7 @@
|
|||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
|
||||
- [Nxploited/CVE-2024-54262](https://github.com/Nxploited/CVE-2024-54262)
|
||||
|
||||
### CVE-2024-54292 (2024-12-13)
|
||||
|
||||
|
@ -10081,6 +10090,20 @@
|
|||
- [soltanali0/CVE-2023-7028](https://github.com/soltanali0/CVE-2023-7028)
|
||||
- [gh-ost00/CVE-2023-7028](https://github.com/gh-ost00/CVE-2023-7028)
|
||||
|
||||
### CVE-2023-7172 (2023-12-30)
|
||||
|
||||
<code>Eine kritische Schwachstelle wurde in PHPGurukul Hospital Management System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Admin Dashboard. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
|
||||
</code>
|
||||
|
||||
- [sharathc213/CVE-2023-7172](https://github.com/sharathc213/CVE-2023-7172)
|
||||
|
||||
### CVE-2023-7173 (2023-12-30)
|
||||
|
||||
<code>Es wurde eine problematische Schwachstelle in PHPGurukul Hospital Management System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei registration.php. Durch das Beeinflussen des Arguments First Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
|
||||
</code>
|
||||
|
||||
- [sharathc213/CVE-2023-7173](https://github.com/sharathc213/CVE-2023-7173)
|
||||
|
||||
### CVE-2023-7261 (2024-06-07)
|
||||
|
||||
<code>Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High)
|
||||
|
@ -10677,6 +10700,7 @@
|
|||
- [aaaademo/Confluence-EvilJar](https://github.com/aaaademo/Confluence-EvilJar)
|
||||
- [edsonjt81/CVE-2023-22515-Scan.](https://github.com/edsonjt81/CVE-2023-22515-Scan.)
|
||||
- [INTfinityConsulting/cve-2023-22515](https://github.com/INTfinityConsulting/cve-2023-22515)
|
||||
- [CalegariMindSec/Exploit-CVE-2023-22515](https://github.com/CalegariMindSec/Exploit-CVE-2023-22515)
|
||||
- [rxerium/CVE-2023-22515](https://github.com/rxerium/CVE-2023-22515)
|
||||
- [fyx1t/NSE--CVE-2023-22515](https://github.com/fyx1t/NSE--CVE-2023-22515)
|
||||
- [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check)
|
||||
|
@ -11091,6 +11115,7 @@
|
|||
|
||||
- [H4R335HR/CVE-2023-24329-PoC](https://github.com/H4R335HR/CVE-2023-24329-PoC)
|
||||
- [Pandante-Central/CVE-2023-24329-codeql-test](https://github.com/Pandante-Central/CVE-2023-24329-codeql-test)
|
||||
- [PenTestMano/CVE-2023-24329-Exploit](https://github.com/PenTestMano/CVE-2023-24329-Exploit)
|
||||
|
||||
### CVE-2023-24488 (2023-07-10)
|
||||
|
||||
|
@ -11533,6 +11558,8 @@
|
|||
- [Hamibubu/CVE-2023-27163](https://github.com/Hamibubu/CVE-2023-27163)
|
||||
- [KharimMchatta/basketcraft](https://github.com/KharimMchatta/basketcraft)
|
||||
- [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163)
|
||||
- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163)
|
||||
- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163)
|
||||
- [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning)
|
||||
- [btar1gan/exploit_CVE-2023-27163](https://github.com/btar1gan/exploit_CVE-2023-27163)
|
||||
|
||||
|
@ -11772,6 +11799,7 @@
|
|||
- [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252)
|
||||
- [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252)
|
||||
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
|
||||
- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
|
||||
- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
|
||||
- [byt3n33dl3/CLFS](https://github.com/byt3n33dl3/CLFS)
|
||||
- [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252)
|
||||
|
@ -11841,6 +11869,7 @@
|
|||
- [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432)
|
||||
- [unam4/CVE-2023-28432-minio_update_rce](https://github.com/unam4/CVE-2023-28432-minio_update_rce)
|
||||
- [C1ph3rX13/CVE-2023-28432](https://github.com/C1ph3rX13/CVE-2023-28432)
|
||||
- [netuseradministrator/CVE-2023-28432](https://github.com/netuseradministrator/CVE-2023-28432)
|
||||
- [xk-mt/CVE-2023-28432](https://github.com/xk-mt/CVE-2023-28432)
|
||||
- [0xRulez/CVE-2023-28432](https://github.com/0xRulez/CVE-2023-28432)
|
||||
|
||||
|
@ -11961,6 +11990,7 @@
|
|||
- [LuemmelSec/CVE-2023-29357](https://github.com/LuemmelSec/CVE-2023-29357)
|
||||
- [KeyStrOke95/CVE-2023-29357-ExE](https://github.com/KeyStrOke95/CVE-2023-29357-ExE)
|
||||
- [Guillaume-Risch/cve-2023-29357-Sharepoint](https://github.com/Guillaume-Risch/cve-2023-29357-Sharepoint)
|
||||
- [Jev1337/CVE-2023-29357-Check](https://github.com/Jev1337/CVE-2023-29357-Check)
|
||||
- [AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357](https://github.com/AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357)
|
||||
|
||||
### CVE-2023-29360 (2023-06-13)
|
||||
|
@ -12369,6 +12399,13 @@
|
|||
|
||||
- [Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure](https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure)
|
||||
|
||||
### CVE-2023-31446 (2024-01-10)
|
||||
|
||||
<code>In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
|
||||
</code>
|
||||
|
||||
- [Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution](https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution)
|
||||
|
||||
### CVE-2023-31497 (2023-05-11)
|
||||
|
||||
<code>Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows attackers to escalate privileges to root via supplying a crafted binary to the target system.
|
||||
|
@ -13135,6 +13172,7 @@
|
|||
- [Malwareman007/CVE-2023-34362](https://github.com/Malwareman007/CVE-2023-34362)
|
||||
- [toorandom/moveit-payload-decrypt-CVE-2023-34362](https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362)
|
||||
- [errorfiathck/MOVEit-Exploit](https://github.com/errorfiathck/MOVEit-Exploit)
|
||||
- [Chinyemba-ck/MOVEit-CVE-2023-34362](https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362)
|
||||
- [glen-pearson/MoveIT-CVE-2023-34362-RCE](https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE)
|
||||
- [aditibv/MOVEit-CVE-2023-34362](https://github.com/aditibv/MOVEit-CVE-2023-34362)
|
||||
|
||||
|
@ -13991,6 +14029,7 @@
|
|||
|
||||
- [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408)
|
||||
- [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408)
|
||||
- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408)
|
||||
- [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408)
|
||||
- [mrtacojr/CVE-2023-38408](https://github.com/mrtacojr/CVE-2023-38408)
|
||||
- [fazilbaig1/cve_2023_38408_scanner](https://github.com/fazilbaig1/cve_2023_38408_scanner)
|
||||
|
@ -14101,6 +14140,7 @@
|
|||
- [Shisones/MetabaseRCE_CVE-2023-38646](https://github.com/Shisones/MetabaseRCE_CVE-2023-38646)
|
||||
- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
|
||||
- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
|
||||
- [DaniTheHack3r/CVE-2023-38646](https://github.com/DaniTheHack3r/CVE-2023-38646)
|
||||
- [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc)
|
||||
- [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase)
|
||||
|
||||
|
@ -14396,6 +14436,13 @@
|
|||
|
||||
- [kenbuckler/WS_FTP-CVE-2023-40044](https://github.com/kenbuckler/WS_FTP-CVE-2023-40044)
|
||||
|
||||
### CVE-2023-40084 (2023-12-04)
|
||||
|
||||
<code>In run of MDnsSdListener.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
||||
</code>
|
||||
|
||||
- [Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084](https://github.com/Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084)
|
||||
|
||||
### CVE-2023-40109 (2024-02-15)
|
||||
|
||||
<code>In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
|
||||
|
@ -16304,6 +16351,15 @@
|
|||
|
||||
- [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974)
|
||||
|
||||
### CVE-2023-48981
|
||||
- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981)
|
||||
|
||||
### CVE-2023-48982
|
||||
- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982)
|
||||
|
||||
### CVE-2023-48983
|
||||
- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983)
|
||||
|
||||
### CVE-2023-49002 (2023-12-27)
|
||||
|
||||
<code>An issue in Xenom Technologies (sinous) Phone Dialer-voice Call Dialer v.1.2.5 allows an attacker to bypass intended access restrictions via interaction with com.funprime.calldialer.ui.activities.OutgoingActivity.
|
||||
|
@ -16340,6 +16396,7 @@
|
|||
- [abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC](https://github.com/abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC)
|
||||
- [0xrobiul/CVE-2023-49070](https://github.com/0xrobiul/CVE-2023-49070)
|
||||
- [D0g3-8Bit/OFBiz-Attack](https://github.com/D0g3-8Bit/OFBiz-Attack)
|
||||
- [UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz](https://github.com/UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz)
|
||||
- [yukselberkay/CVE-2023-49070_CVE-2023-51467](https://github.com/yukselberkay/CVE-2023-49070_CVE-2023-51467)
|
||||
- [Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467](https://github.com/Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467)
|
||||
|
||||
|
@ -16794,9 +16851,30 @@
|
|||
### CVE-2023-51000
|
||||
- [Team-Byerus/CVE-2023-51000](https://github.com/Team-Byerus/CVE-2023-51000)
|
||||
|
||||
### CVE-2023-51073 (2024-01-11)
|
||||
|
||||
<code>An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh.
|
||||
</code>
|
||||
|
||||
- [christopher-pace/CVE-2023-51073](https://github.com/christopher-pace/CVE-2023-51073)
|
||||
|
||||
### CVE-2023-51119
|
||||
- [OscarAkaElvis/CVE-2023-51119](https://github.com/OscarAkaElvis/CVE-2023-51119)
|
||||
|
||||
### CVE-2023-51126 (2024-01-10)
|
||||
|
||||
<code>Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter.
|
||||
</code>
|
||||
|
||||
- [risuxx/CVE-2023-51126](https://github.com/risuxx/CVE-2023-51126)
|
||||
|
||||
### CVE-2023-51127 (2024-01-10)
|
||||
|
||||
<code>FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file.
|
||||
</code>
|
||||
|
||||
- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127)
|
||||
|
||||
### CVE-2023-51214
|
||||
- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
|
||||
|
||||
|
@ -16819,6 +16897,10 @@
|
|||
- [LtmThink/CVE-2023-51385_test](https://github.com/LtmThink/CVE-2023-51385_test)
|
||||
- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
|
||||
- [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test)
|
||||
- [WOOOOONG/CVE-2023-51385](https://github.com/WOOOOONG/CVE-2023-51385)
|
||||
- [uccu99/CVE-2023-51385](https://github.com/uccu99/CVE-2023-51385)
|
||||
- [julienbrs/exploit-CVE-2023-51385](https://github.com/julienbrs/exploit-CVE-2023-51385)
|
||||
- [julienbrs/malicious-exploit-CVE-2023-51385](https://github.com/julienbrs/malicious-exploit-CVE-2023-51385)
|
||||
- [Sonicrrrr/CVE-2023-51385](https://github.com/Sonicrrrr/CVE-2023-51385)
|
||||
- [farliy-hacker/CVE-2023-51385](https://github.com/farliy-hacker/CVE-2023-51385)
|
||||
- [farliy-hacker/CVE-2023-51385-save](https://github.com/farliy-hacker/CVE-2023-51385-save)
|
||||
|
@ -16855,6 +16937,8 @@
|
|||
- [Chocapikk/CVE-2023-51467](https://github.com/Chocapikk/CVE-2023-51467)
|
||||
- [K3ysTr0K3R/CVE-2023-51467-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-51467-EXPLOIT)
|
||||
- [jakabakos/Apache-OFBiz-Authentication-Bypass](https://github.com/jakabakos/Apache-OFBiz-Authentication-Bypass)
|
||||
- [Subha-BOO7/Exploit_CVE-2023-51467](https://github.com/Subha-BOO7/Exploit_CVE-2023-51467)
|
||||
- [JaneMandy/CVE-2023-51467-Exploit](https://github.com/JaneMandy/CVE-2023-51467-Exploit)
|
||||
- [vulncheck-oss/cve-2023-51467](https://github.com/vulncheck-oss/cve-2023-51467)
|
||||
- [2ptr/BadBizness-CVE-2023-51467](https://github.com/2ptr/BadBizness-CVE-2023-51467)
|
||||
- [AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-](https://github.com/AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-)
|
||||
|
@ -16881,6 +16965,7 @@
|
|||
- [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764)
|
||||
- [eeenvik1/CVE-2023-51764](https://github.com/eeenvik1/CVE-2023-51764)
|
||||
- [d4op/CVE-2023-51764-POC](https://github.com/d4op/CVE-2023-51764-POC)
|
||||
- [Double-q1015/CVE-2023-51764](https://github.com/Double-q1015/CVE-2023-51764)
|
||||
|
||||
### CVE-2023-51800 (2024-02-29)
|
||||
|
||||
|
@ -33971,6 +34056,7 @@
|
|||
- [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882)
|
||||
- [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC)
|
||||
- [AleksaZatezalo/CVE-2020-14882](https://github.com/AleksaZatezalo/CVE-2020-14882)
|
||||
- [KKC73/weblogic-cve-2020-14882](https://github.com/KKC73/weblogic-cve-2020-14882)
|
||||
|
||||
### CVE-2020-14883 (2020-10-21)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue