Auto Update 2023/03/20 12:31:44

This commit is contained in:
motikan2010-bot 2023-03-20 21:31:44 +09:00
parent eb1cbb591d
commit 91fa54fbf2
42 changed files with 395 additions and 214 deletions

View file

@ -527,6 +527,35 @@
"watchers": 0,
"score": 0
},
{
"id": 409358521,
"name": "CVE-2018-11235",
"full_name": "j4k0m\/CVE-2018-11235",
"owner": {
"login": "j4k0m",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/j4k0m"
},
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2018-11235",
"description": "Auto malicious git repository creation to exploit CVE-2018-11235 a Remote Code Execution using Git Sub module.",
"fork": false,
"created_at": "2021-09-22T21:15:50Z",
"updated_at": "2022-03-15T07:47:40Z",
"pushed_at": "2021-09-22T21:28:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 465383137,
"name": "cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration",

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2023-03-19T11:31:46Z",
"updated_at": "2023-03-20T09:07:51Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 477,
"watchers_count": 477,
"stargazers_count": 478,
"watchers_count": 478,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 477,
"watchers": 478,
"score": 0
},
{

View file

@ -464,10 +464,10 @@
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2021-03-19T16:41:31Z",
"updated_at": "2023-03-09T20:11:19Z",
"updated_at": "2023-03-20T06:51:47Z",
"pushed_at": "2021-11-17T14:40:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -476,7 +476,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2023-03-09T06:01:32Z",
"updated_at": "2023-03-20T06:42:56Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 129,
"watchers": 130,
"score": 0
},
{

View file

@ -62,10 +62,10 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2023-03-10T09:49:37Z",
"updated_at": "2023-03-20T07:13:20Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -74,7 +74,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 274,
"watchers": 275,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 362,
"watchers_count": 362,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"windows"
],
"visibility": "public",
"forks": 42,
"forks": 43,
"watchers": 362,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-12T20:59:03Z",
"updated_at": "2023-01-13T11:27:27Z",
"updated_at": "2023-03-20T08:15:32Z",
"pushed_at": "2020-10-19T13:58:46Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 18,
"watchers": 20,
"score": 0
}
]

View file

@ -100,10 +100,10 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2023-03-13T08:24:01Z",
"updated_at": "2023-03-20T09:29:27Z",
"pushed_at": "2021-11-26T07:40:35Z",
"stargazers_count": 277,
"watchers_count": 277,
"stargazers_count": 279,
"watchers_count": 279,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 101,
"watchers": 277,
"watchers": 279,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-20T05:14:11Z",
"updated_at": "2023-03-20T12:19:54Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1644,
"watchers_count": 1644,
"stargazers_count": 1645,
"watchers_count": 1645,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1644,
"watchers": 1645,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "CVE-2020-36109 PoC causing DoS",
"fork": false,
"created_at": "2022-04-20T20:07:51Z",
"updated_at": "2023-03-14T23:18:22Z",
"updated_at": "2023-03-20T07:11:45Z",
"pushed_at": "2022-04-20T20:10:11Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2023-03-20T01:56:11Z",
"updated_at": "2023-03-20T11:31:08Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 89,
"forks": 14,
"watchers": 90,
"score": 0
}
]

View file

@ -129,10 +129,10 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2023-03-17T02:18:17Z",
"updated_at": "2023-03-20T09:00:12Z",
"pushed_at": "2021-12-03T22:09:31Z",
"stargazers_count": 296,
"watchers_count": 296,
"stargazers_count": 297,
"watchers_count": 297,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 296,
"watchers": 297,
"score": 0
},
{

View file

@ -1153,10 +1153,10 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2023-03-15T01:17:02Z",
"updated_at": "2023-03-20T07:53:36Z",
"pushed_at": "2022-10-21T08:59:23Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -1165,7 +1165,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 163,
"watchers": 164,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2023-03-17T15:05:27Z",
"updated_at": "2023-03-20T06:26:59Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 172,
"watchers": 173,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2023-03-09T06:01:32Z",
"updated_at": "2023-03-20T06:42:56Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 129,
"watchers": 130,
"score": 0
},
{

View file

@ -908,10 +908,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-03-19T16:47:53Z",
"updated_at": "2023-03-20T10:04:59Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 753,
"watchers_count": 753,
"stargazers_count": 754,
"watchers_count": 754,
"has_discussions": false,
"forks_count": 157,
"allow_forking": true,
@ -922,7 +922,7 @@
],
"visibility": "public",
"forks": 157,
"watchers": 753,
"watchers": 754,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 1191,
"watchers_count": 1191,
"has_discussions": false,
"forks_count": 306,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 306,
"forks": 307,
"watchers": 1191,
"score": 0
},

View file

@ -909,10 +909,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-03-16T10:47:13Z",
"updated_at": "2023-03-20T10:39:55Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1548,
"watchers_count": 1548,
"stargazers_count": 1549,
"watchers_count": 1549,
"has_discussions": false,
"forks_count": 449,
"allow_forking": true,
@ -926,7 +926,7 @@
],
"visibility": "public",
"forks": 449,
"watchers": 1548,
"watchers": 1549,
"score": 0
},
{
@ -3647,10 +3647,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-03-20T03:31:27Z",
"updated_at": "2023-03-20T11:39:03Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3214,
"watchers_count": 3214,
"stargazers_count": 3213,
"watchers_count": 3213,
"has_discussions": true,
"forks_count": 747,
"allow_forking": true,
@ -3659,7 +3659,7 @@
"topics": [],
"visibility": "public",
"forks": 747,
"watchers": 3214,
"watchers": 3213,
"score": 0
},
{
@ -11986,5 +11986,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 616448829,
"name": "CVE-2021-44228",
"full_name": "heeloo123\/CVE-2021-44228",
"owner": {
"login": "heeloo123",
"id": 100338414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100338414?v=4",
"html_url": "https:\/\/github.com\/heeloo123"
},
"html_url": "https:\/\/github.com\/heeloo123\/CVE-2021-44228",
"description": "CVE-2021-44228 ",
"fork": false,
"created_at": "2023-03-20T12:13:13Z",
"updated_at": "2023-03-20T12:13:13Z",
"pushed_at": "2023-03-20T12:14:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -972,10 +972,10 @@
"description": "CVE-2022-0847 POC and Docker and Analysis write up",
"fork": false,
"created_at": "2022-03-10T01:27:29Z",
"updated_at": "2023-02-19T04:12:37Z",
"updated_at": "2023-03-20T07:28:43Z",
"pushed_at": "2022-03-10T01:31:57Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -984,7 +984,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -1175,10 +1175,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-03-20T00:19:18Z",
"updated_at": "2023-03-20T10:25:12Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 380,
"watchers_count": 380,
"stargazers_count": 382,
"watchers_count": 382,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -1187,7 +1187,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 380,
"watchers": 382,
"score": 0
},
{

View file

@ -100,7 +100,7 @@
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
"fork": false,
"created_at": "2022-03-03T13:13:02Z",
"updated_at": "2023-03-18T04:22:53Z",
"updated_at": "2023-03-20T07:41:12Z",
"pushed_at": "2022-11-14T01:34:04Z",
"stargazers_count": 71,
"watchers_count": 71,

View file

@ -13,10 +13,10 @@
"description": "The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc",
"fork": false,
"created_at": "2023-03-02T20:18:54Z",
"updated_at": "2023-03-16T23:11:10Z",
"updated_at": "2023-03-20T08:59:48Z",
"pushed_at": "2023-03-08T20:32:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -546,10 +546,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T03:30:20Z",
"updated_at": "2023-02-21T03:30:20Z",
"updated_at": "2023-03-20T07:44:06Z",
"pushed_at": "2023-02-21T03:45:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -558,7 +558,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
},
@ -42,10 +42,10 @@
"description": "CVE-2022-24716 | Arbitrary File Disclosure Icingaweb2",
"fork": false,
"created_at": "2023-03-20T02:25:55Z",
"updated_at": "2023-03-20T02:34:20Z",
"updated_at": "2023-03-20T11:05:24Z",
"pushed_at": "2023-03-20T02:32:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2023-03-19T12:02:56Z",
"updated_at": "2023-03-20T08:45:26Z",
"pushed_at": "2023-03-04T05:52:28Z",
"stargazers_count": 419,
"watchers_count": 419,
"stargazers_count": 420,
"watchers_count": 420,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 419,
"watchers": 420,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.",
"fork": false,
"created_at": "2022-12-22T17:52:26Z",
"updated_at": "2023-03-06T03:06:18Z",
"updated_at": "2023-03-20T08:12:45Z",
"pushed_at": "2022-12-26T09:49:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

31
2022/CVE-2022-35649.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 610209003,
"name": "CVE-2022-35649",
"full_name": "antoinenguyen-09\/CVE-2022-35649",
"owner": {
"login": "antoinenguyen-09",
"id": 61876488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61876488?v=4",
"html_url": "https:\/\/github.com\/antoinenguyen-09"
},
"html_url": "https:\/\/github.com\/antoinenguyen-09\/CVE-2022-35649",
"description": "Payload Generator and Detailed Analysis about CVE-2022-35649 ",
"fork": false,
"created_at": "2023-03-06T10:09:59Z",
"updated_at": "2023-03-20T10:23:25Z",
"pushed_at": "2023-03-07T09:48:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -42,19 +42,19 @@
"description": "CVE-2022-3699 with arbitrary kernel code execution capability",
"fork": false,
"created_at": "2022-12-25T04:34:26Z",
"updated_at": "2023-03-15T06:59:06Z",
"updated_at": "2023-03-20T07:12:27Z",
"pushed_at": "2022-12-27T21:30:08Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 61,
"forks": 24,
"watchers": 62,
"score": 0
}
]

View file

@ -76,13 +76,13 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 23,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T14:24:12Z",
"updated_at": "2023-02-23T21:51:54Z",
"updated_at": "2023-03-20T09:30:18Z",
"pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 308,
"watchers_count": 308,
"stargazers_count": 309,
"watchers_count": 309,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 308,
"watchers": 309,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
"fork": false,
"created_at": "2023-01-13T21:27:03Z",
"updated_at": "2023-03-19T15:53:10Z",
"updated_at": "2023-03-20T08:53:47Z",
"pushed_at": "2023-01-20T10:31:58Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -190,10 +190,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false,
"created_at": "2023-02-05T18:42:27Z",
"updated_at": "2023-03-20T05:55:08Z",
"updated_at": "2023-03-20T11:50:52Z",
"pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -202,7 +202,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 115,
"watchers": 117,
"score": 0
},
{

View file

@ -71,7 +71,7 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-03-18T19:22:49Z",
"updated_at": "2023-03-20T10:34:08Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 773,
"watchers_count": 773,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-21T01:02:01Z",
"updated_at": "2023-03-19T13:33:56Z",
"updated_at": "2023-03-20T10:23:36Z",
"pushed_at": "2023-02-16T13:49:47Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 137,
"watchers": 138,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-03-20T05:05:00Z",
"updated_at": "2023-03-20T12:21:33Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 25,
"score": 0
}
]

31
2023/CVE-2023-1337.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 616393433,
"name": "CVE-2023-1337",
"full_name": "Penkyzduyi\/CVE-2023-1337",
"owner": {
"login": "Penkyzduyi",
"id": 69184246,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69184246?v=4",
"html_url": "https:\/\/github.com\/Penkyzduyi"
},
"html_url": "https:\/\/github.com\/Penkyzduyi\/CVE-2023-1337",
"description": "Puni love is",
"fork": false,
"created_at": "2023-03-20T09:57:53Z",
"updated_at": "2023-03-20T09:57:53Z",
"pushed_at": "2023-03-20T09:57:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-20T03:32:26Z",
"updated_at": "2023-03-20T11:20:57Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 310,
"watchers_count": 310,
"stargazers_count": 313,
"watchers_count": 313,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 310,
"watchers": 313,
"score": 0
},
{
@ -76,7 +76,7 @@
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -90,7 +90,7 @@
"windows"
],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 91,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-03-20T03:05:27Z",
"updated_at": "2023-03-20T08:19:17Z",
"pushed_at": "2023-03-03T03:30:04Z",
"stargazers_count": 470,
"watchers_count": 470,
"stargazers_count": 472,
"watchers_count": 472,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 470,
"watchers": 472,
"score": 0
},
{

60
2023/CVE-2023-23192.json Normal file
View file

@ -0,0 +1,60 @@
[
{
"id": 616350414,
"name": "CVE-2023-23192",
"full_name": "pinarsadioglu\/CVE-2023-23192",
"owner": {
"login": "pinarsadioglu",
"id": 18392750,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18392750?v=4",
"html_url": "https:\/\/github.com\/pinarsadioglu"
},
"html_url": "https:\/\/github.com\/pinarsadioglu\/CVE-2023-23192",
"description": "CVE-2023-23192",
"fork": false,
"created_at": "2023-03-20T08:06:55Z",
"updated_at": "2023-03-20T08:06:55Z",
"pushed_at": "2023-03-20T08:06:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 616394169,
"name": "CVE-2023-23192",
"full_name": "Penkyzduyi\/CVE-2023-23192",
"owner": {
"login": "Penkyzduyi",
"id": 69184246,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69184246?v=4",
"html_url": "https:\/\/github.com\/Penkyzduyi"
},
"html_url": "https:\/\/github.com\/Penkyzduyi\/CVE-2023-23192",
"description": "CVE-2023-23192 test ",
"fork": false,
"created_at": "2023-03-20T09:59:39Z",
"updated_at": "2023-03-20T09:59:39Z",
"pushed_at": "2023-03-20T09:59:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-03-20T05:29:18Z",
"updated_at": "2023-03-20T08:05:54Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 120,
"watchers": 121,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "CVE-2023-23397 - Microsoft Outlook Vulnerability",
"fork": false,
"created_at": "2023-03-16T14:07:15Z",
"updated_at": "2023-03-17T08:46:52Z",
"updated_at": "2023-03-20T08:40:04Z",
"pushed_at": "2023-03-17T09:46:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -168,19 +168,19 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-03-20T05:29:16Z",
"updated_at": "2023-03-20T11:15:58Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 203,
"watchers_count": 203,
"has_discussions": false,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 196,
"forks": 28,
"watchers": 203,
"score": 0
},
{

View file

@ -1,33 +1,4 @@
[
{
"id": 615320477,
"name": "CVE-2023-23415",
"full_name": "wh-gov\/CVE-2023-23415",
"owner": {
"login": "wh-gov",
"id": 120082360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120082360?v=4",
"html_url": "https:\/\/github.com\/wh-gov"
},
"html_url": "https:\/\/github.com\/wh-gov\/CVE-2023-23415",
"description": "CVE-2023-23415",
"fork": false,
"created_at": "2023-03-17T12:38:30Z",
"updated_at": "2023-03-20T06:10:42Z",
"pushed_at": "2023-03-17T12:45:04Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 36,
"score": 0
},
{
"id": 615739317,
"name": "CVE-2023-23415",

31
2023/CVE-2023-23416.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 615741665,
"name": "CVE-2023-23416",
"full_name": "amitdubey1921\/CVE-2023-23416",
"owner": {
"login": "amitdubey1921",
"id": 105290502,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105290502?v=4",
"html_url": "https:\/\/github.com\/amitdubey1921"
},
"html_url": "https:\/\/github.com\/amitdubey1921\/CVE-2023-23416",
"description": "CVE-2023-23415",
"fork": false,
"created_at": "2023-03-18T14:49:52Z",
"updated_at": "2023-03-18T11:37:10Z",
"pushed_at": "2023-03-17T12:45:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 0,
"score": 0
}
]

View file

@ -27,34 +27,5 @@
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 611038094,
"name": "CVE-2023-23924-sample",
"full_name": "zeverse\/CVE-2023-23924-sample",
"owner": {
"login": "zeverse",
"id": 115418435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115418435?v=4",
"html_url": "https:\/\/github.com\/zeverse"
},
"html_url": "https:\/\/github.com\/zeverse\/CVE-2023-23924-sample",
"description": null,
"fork": false,
"created_at": "2023-03-08T01:16:16Z",
"updated_at": "2023-03-15T17:26:38Z",
"pushed_at": "2023-03-19T18:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -83,6 +83,14 @@ Es wurde eine kritische Schwachstelle in Drag and Drop Multiple File Upload Cont
- [Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal](https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal)
### CVE-2023-1337 (2023-03-10)
<code>
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files.
</code>
- [Penkyzduyi/CVE-2023-1337](https://github.com/Penkyzduyi/CVE-2023-1337)
### CVE-2023-1415 (2023-03-15)
<code>
@ -223,6 +231,10 @@ A Path Traversal in setup.php in OpenEMR &lt; 7.0.0 allows remote unauthenticate
### CVE-2023-23138
- [OmarAtallahh/CVE-2023-23138](https://github.com/OmarAtallahh/CVE-2023-23138)
### CVE-2023-23192
- [pinarsadioglu/CVE-2023-23192](https://github.com/pinarsadioglu/CVE-2023-23192)
- [Penkyzduyi/CVE-2023-23192](https://github.com/Penkyzduyi/CVE-2023-23192)
### CVE-2023-23279 (2023-02-17)
<code>
@ -272,9 +284,16 @@ Microsoft Outlook Elevation of Privilege Vulnerability
Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
</code>
- [wh-gov/CVE-2023-23415](https://github.com/wh-gov/CVE-2023-23415)
- [amitdubey1921/CVE-2023-23415](https://github.com/amitdubey1921/CVE-2023-23415)
### CVE-2023-23416 (2023-03-14)
<code>
Windows Cryptographic Services Remote Code Execution Vulnerability
</code>
- [amitdubey1921/CVE-2023-23416](https://github.com/amitdubey1921/CVE-2023-23416)
### CVE-2023-23488 (2023-01-20)
<code>
@ -313,7 +332,6 @@ Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be by
</code>
- [motikan2010/CVE-2023-23924](https://github.com/motikan2010/CVE-2023-23924)
- [zeverse/CVE-2023-23924-sample](https://github.com/zeverse/CVE-2023-23924-sample)
### CVE-2023-24055 (2023-01-21)
@ -4806,6 +4824,14 @@ The Blink1Control2 application &lt;= 2.2.7 uses weak password encryption and an
- [p1ckzi/CVE-2022-35513](https://github.com/p1ckzi/CVE-2022-35513)
### CVE-2022-35649 (2022-07-25)
<code>
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
</code>
- [antoinenguyen-09/CVE-2022-35649](https://github.com/antoinenguyen-09/CVE-2022-35649)
### CVE-2022-35698 (2022-10-14)
<code>
@ -12655,6 +12681,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [demining/Log4j-Vulnerability](https://github.com/demining/Log4j-Vulnerability)
- [pierpaolosestito-dev/Log4Shell-CVE-2021-44228-PoC](https://github.com/pierpaolosestito-dev/Log4Shell-CVE-2021-44228-PoC)
- [Sma-Das/Log4j-PoC](https://github.com/Sma-Das/Log4j-PoC)
- [heeloo123/CVE-2021-44228](https://github.com/heeloo123/CVE-2021-44228)
### CVE-2021-44255 (2022-01-31)
@ -24746,6 +24773,7 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before
- [jongmartinez/CVE-2018-11235-PoC](https://github.com/jongmartinez/CVE-2018-11235-PoC)
- [MohamedTarekq/test-CVE-2018-11235](https://github.com/MohamedTarekq/test-CVE-2018-11235)
- [Yealid/CVE-2018-11235-Git-Submodule-RCE](https://github.com/Yealid/CVE-2018-11235-Git-Submodule-RCE)
- [j4k0m/CVE-2018-11235](https://github.com/j4k0m/CVE-2018-11235)
- [twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration](https://github.com/twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration)
- [SenSecurity/exploit](https://github.com/SenSecurity/exploit)
- [EmaVirgRep/CVE-2018-11235](https://github.com/EmaVirgRep/CVE-2018-11235)