mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/03/20 12:31:44
This commit is contained in:
parent
eb1cbb591d
commit
91fa54fbf2
42 changed files with 395 additions and 214 deletions
|
@ -527,6 +527,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 409358521,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "j4k0m\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "j4k0m",
|
||||
"id": 48088579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
||||
"html_url": "https:\/\/github.com\/j4k0m"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2018-11235",
|
||||
"description": "Auto malicious git repository creation to exploit CVE-2018-11235 a Remote Code Execution using Git Sub module.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-22T21:15:50Z",
|
||||
"updated_at": "2022-03-15T07:47:40Z",
|
||||
"pushed_at": "2021-09-22T21:28:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 465383137,
|
||||
"name": "cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2023-03-19T11:31:46Z",
|
||||
"updated_at": "2023-03-20T09:07:51Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -464,10 +464,10 @@
|
|||
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T16:41:31Z",
|
||||
"updated_at": "2023-03-09T20:11:19Z",
|
||||
"updated_at": "2023-03-20T06:51:47Z",
|
||||
"pushed_at": "2021-11-17T14:40:14Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -476,7 +476,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2023-03-09T06:01:32Z",
|
||||
"updated_at": "2023-03-20T06:42:56Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 129,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -62,10 +62,10 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2023-03-10T09:49:37Z",
|
||||
"updated_at": "2023-03-20T07:13:20Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 274,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"forks": 43,
|
||||
"watchers": 362,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-12T20:59:03Z",
|
||||
"updated_at": "2023-01-13T11:27:27Z",
|
||||
"updated_at": "2023-03-20T08:15:32Z",
|
||||
"pushed_at": "2020-10-19T13:58:46Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 18,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -100,10 +100,10 @@
|
|||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2023-03-13T08:24:01Z",
|
||||
"updated_at": "2023-03-20T09:29:27Z",
|
||||
"pushed_at": "2021-11-26T07:40:35Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"has_discussions": false,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"watchers": 277,
|
||||
"watchers": 279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-20T05:14:11Z",
|
||||
"updated_at": "2023-03-20T12:19:54Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1644,
|
||||
"watchers_count": 1644,
|
||||
"stargazers_count": 1645,
|
||||
"watchers_count": 1645,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1644,
|
||||
"watchers": 1645,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2020-36109 PoC causing DoS",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T20:07:51Z",
|
||||
"updated_at": "2023-03-14T23:18:22Z",
|
||||
"updated_at": "2023-03-20T07:11:45Z",
|
||||
"pushed_at": "2022-04-20T20:10:11Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2023-03-20T01:56:11Z",
|
||||
"updated_at": "2023-03-20T11:31:08Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 89,
|
||||
"forks": 14,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -129,10 +129,10 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2023-03-17T02:18:17Z",
|
||||
"updated_at": "2023-03-20T09:00:12Z",
|
||||
"pushed_at": "2021-12-03T22:09:31Z",
|
||||
"stargazers_count": 296,
|
||||
"watchers_count": 296,
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 296,
|
||||
"watchers": 297,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1153,10 +1153,10 @@
|
|||
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T11:12:30Z",
|
||||
"updated_at": "2023-03-15T01:17:02Z",
|
||||
"updated_at": "2023-03-20T07:53:36Z",
|
||||
"pushed_at": "2022-10-21T08:59:23Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -1165,7 +1165,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 163,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2023-03-17T15:05:27Z",
|
||||
"updated_at": "2023-03-20T06:26:59Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 172,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2023-03-09T06:01:32Z",
|
||||
"updated_at": "2023-03-20T06:42:56Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 129,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -908,10 +908,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-03-19T16:47:53Z",
|
||||
"updated_at": "2023-03-20T10:04:59Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 753,
|
||||
"watchers_count": 753,
|
||||
"stargazers_count": 754,
|
||||
"watchers_count": 754,
|
||||
"has_discussions": false,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
|
@ -922,7 +922,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 157,
|
||||
"watchers": 753,
|
||||
"watchers": 754,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1191,
|
||||
"watchers_count": 1191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 306,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"forks": 307,
|
||||
"watchers": 1191,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -909,10 +909,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-03-16T10:47:13Z",
|
||||
"updated_at": "2023-03-20T10:39:55Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1548,
|
||||
"watchers_count": 1548,
|
||||
"stargazers_count": 1549,
|
||||
"watchers_count": 1549,
|
||||
"has_discussions": false,
|
||||
"forks_count": 449,
|
||||
"allow_forking": true,
|
||||
|
@ -926,7 +926,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 449,
|
||||
"watchers": 1548,
|
||||
"watchers": 1549,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3647,10 +3647,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-03-20T03:31:27Z",
|
||||
"updated_at": "2023-03-20T11:39:03Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3214,
|
||||
"watchers_count": 3214,
|
||||
"stargazers_count": 3213,
|
||||
"watchers_count": 3213,
|
||||
"has_discussions": true,
|
||||
"forks_count": 747,
|
||||
"allow_forking": true,
|
||||
|
@ -3659,7 +3659,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 747,
|
||||
"watchers": 3214,
|
||||
"watchers": 3213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -11986,5 +11986,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 616448829,
|
||||
"name": "CVE-2021-44228",
|
||||
"full_name": "heeloo123\/CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "heeloo123",
|
||||
"id": 100338414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100338414?v=4",
|
||||
"html_url": "https:\/\/github.com\/heeloo123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/heeloo123\/CVE-2021-44228",
|
||||
"description": "CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T12:13:13Z",
|
||||
"updated_at": "2023-03-20T12:13:13Z",
|
||||
"pushed_at": "2023-03-20T12:14:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -972,10 +972,10 @@
|
|||
"description": "CVE-2022-0847 POC and Docker and Analysis write up",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-10T01:27:29Z",
|
||||
"updated_at": "2023-02-19T04:12:37Z",
|
||||
"updated_at": "2023-03-20T07:28:43Z",
|
||||
"pushed_at": "2022-03-10T01:31:57Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -984,7 +984,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1175,10 +1175,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-03-20T00:19:18Z",
|
||||
"updated_at": "2023-03-20T10:25:12Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -1187,7 +1187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 380,
|
||||
"watchers": 382,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,7 +100,7 @@
|
|||
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-03T13:13:02Z",
|
||||
"updated_at": "2023-03-18T04:22:53Z",
|
||||
"updated_at": "2023-03-20T07:41:12Z",
|
||||
"pushed_at": "2022-11-14T01:34:04Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-02T20:18:54Z",
|
||||
"updated_at": "2023-03-16T23:11:10Z",
|
||||
"updated_at": "2023-03-20T08:59:48Z",
|
||||
"pushed_at": "2023-03-08T20:32:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -546,10 +546,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-21T03:30:20Z",
|
||||
"updated_at": "2023-02-21T03:30:20Z",
|
||||
"updated_at": "2023-03-20T07:44:06Z",
|
||||
"pushed_at": "2023-02-21T03:45:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -558,7 +558,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2022-24716 | Arbitrary File Disclosure Icingaweb2",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T02:25:55Z",
|
||||
"updated_at": "2023-03-20T02:34:20Z",
|
||||
"updated_at": "2023-03-20T11:05:24Z",
|
||||
"pushed_at": "2023-03-20T02:32:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2023-03-19T12:02:56Z",
|
||||
"updated_at": "2023-03-20T08:45:26Z",
|
||||
"pushed_at": "2023-03-04T05:52:28Z",
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 419,
|
||||
"watchers": 420,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T17:52:26Z",
|
||||
"updated_at": "2023-03-06T03:06:18Z",
|
||||
"updated_at": "2023-03-20T08:12:45Z",
|
||||
"pushed_at": "2022-12-26T09:49:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-35649.json
Normal file
31
2022/CVE-2022-35649.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 610209003,
|
||||
"name": "CVE-2022-35649",
|
||||
"full_name": "antoinenguyen-09\/CVE-2022-35649",
|
||||
"owner": {
|
||||
"login": "antoinenguyen-09",
|
||||
"id": 61876488,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61876488?v=4",
|
||||
"html_url": "https:\/\/github.com\/antoinenguyen-09"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/antoinenguyen-09\/CVE-2022-35649",
|
||||
"description": "Payload Generator and Detailed Analysis about CVE-2022-35649 ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-06T10:09:59Z",
|
||||
"updated_at": "2023-03-20T10:23:25Z",
|
||||
"pushed_at": "2023-03-07T09:48:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,19 +42,19 @@
|
|||
"description": "CVE-2022-3699 with arbitrary kernel code execution capability",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-25T04:34:26Z",
|
||||
"updated_at": "2023-03-15T06:59:06Z",
|
||||
"updated_at": "2023-03-20T07:12:27Z",
|
||||
"pushed_at": "2022-12-27T21:30:08Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 61,
|
||||
"forks": 24,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -76,13 +76,13 @@
|
|||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2023-02-23T21:51:54Z",
|
||||
"updated_at": "2023-03-20T09:30:18Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 308,
|
||||
"watchers": 309,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-13T21:27:03Z",
|
||||
"updated_at": "2023-03-19T15:53:10Z",
|
||||
"updated_at": "2023-03-20T08:53:47Z",
|
||||
"pushed_at": "2023-01-20T10:31:58Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -190,10 +190,10 @@
|
|||
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-05T18:42:27Z",
|
||||
"updated_at": "2023-03-20T05:55:08Z",
|
||||
"updated_at": "2023-03-20T11:50:52Z",
|
||||
"pushed_at": "2023-02-05T19:35:03Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -202,7 +202,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 115,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,7 +71,7 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-03-18T19:22:49Z",
|
||||
"updated_at": "2023-03-20T10:34:08Z",
|
||||
"pushed_at": "2023-02-21T04:16:19Z",
|
||||
"stargazers_count": 773,
|
||||
"watchers_count": 773,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T01:02:01Z",
|
||||
"updated_at": "2023-03-19T13:33:56Z",
|
||||
"updated_at": "2023-03-20T10:23:36Z",
|
||||
"pushed_at": "2023-02-16T13:49:47Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 137,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T02:20:52Z",
|
||||
"updated_at": "2023-03-20T05:05:00Z",
|
||||
"updated_at": "2023-03-20T12:21:33Z",
|
||||
"pushed_at": "2023-03-16T02:22:28Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2023/CVE-2023-1337.json
Normal file
31
2023/CVE-2023-1337.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 616393433,
|
||||
"name": "CVE-2023-1337",
|
||||
"full_name": "Penkyzduyi\/CVE-2023-1337",
|
||||
"owner": {
|
||||
"login": "Penkyzduyi",
|
||||
"id": 69184246,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69184246?v=4",
|
||||
"html_url": "https:\/\/github.com\/Penkyzduyi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Penkyzduyi\/CVE-2023-1337",
|
||||
"description": "Puni love is",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T09:57:53Z",
|
||||
"updated_at": "2023-03-20T09:57:53Z",
|
||||
"pushed_at": "2023-03-20T09:57:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-03-20T03:32:26Z",
|
||||
"updated_at": "2023-03-20T11:20:57Z",
|
||||
"pushed_at": "2023-03-10T08:58:44Z",
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 310,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -76,7 +76,7 @@
|
|||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -90,7 +90,7 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"forks": 28,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-03-20T03:05:27Z",
|
||||
"updated_at": "2023-03-20T08:19:17Z",
|
||||
"pushed_at": "2023-03-03T03:30:04Z",
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 470,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
60
2023/CVE-2023-23192.json
Normal file
60
2023/CVE-2023-23192.json
Normal file
|
@ -0,0 +1,60 @@
|
|||
[
|
||||
{
|
||||
"id": 616350414,
|
||||
"name": "CVE-2023-23192",
|
||||
"full_name": "pinarsadioglu\/CVE-2023-23192",
|
||||
"owner": {
|
||||
"login": "pinarsadioglu",
|
||||
"id": 18392750,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18392750?v=4",
|
||||
"html_url": "https:\/\/github.com\/pinarsadioglu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pinarsadioglu\/CVE-2023-23192",
|
||||
"description": "CVE-2023-23192",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T08:06:55Z",
|
||||
"updated_at": "2023-03-20T08:06:55Z",
|
||||
"pushed_at": "2023-03-20T08:06:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 616394169,
|
||||
"name": "CVE-2023-23192",
|
||||
"full_name": "Penkyzduyi\/CVE-2023-23192",
|
||||
"owner": {
|
||||
"login": "Penkyzduyi",
|
||||
"id": 69184246,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69184246?v=4",
|
||||
"html_url": "https:\/\/github.com\/Penkyzduyi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Penkyzduyi\/CVE-2023-23192",
|
||||
"description": "CVE-2023-23192 test ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T09:59:39Z",
|
||||
"updated_at": "2023-03-20T09:59:39Z",
|
||||
"pushed_at": "2023-03-20T09:59:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for the CVE-2023-23397",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T17:03:38Z",
|
||||
"updated_at": "2023-03-20T05:29:18Z",
|
||||
"updated_at": "2023-03-20T08:05:54Z",
|
||||
"pushed_at": "2023-03-15T17:53:53Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2023-23397 - Microsoft Outlook Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T14:07:15Z",
|
||||
"updated_at": "2023-03-17T08:46:52Z",
|
||||
"updated_at": "2023-03-20T08:40:04Z",
|
||||
"pushed_at": "2023-03-17T09:46:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -168,19 +168,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:43:39Z",
|
||||
"updated_at": "2023-03-20T05:29:16Z",
|
||||
"updated_at": "2023-03-20T11:15:58Z",
|
||||
"pushed_at": "2023-03-17T07:47:40Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 196,
|
||||
"forks": 28,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 615320477,
|
||||
"name": "CVE-2023-23415",
|
||||
"full_name": "wh-gov\/CVE-2023-23415",
|
||||
"owner": {
|
||||
"login": "wh-gov",
|
||||
"id": 120082360,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120082360?v=4",
|
||||
"html_url": "https:\/\/github.com\/wh-gov"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wh-gov\/CVE-2023-23415",
|
||||
"description": "CVE-2023-23415",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-17T12:38:30Z",
|
||||
"updated_at": "2023-03-20T06:10:42Z",
|
||||
"pushed_at": "2023-03-17T12:45:04Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 615739317,
|
||||
"name": "CVE-2023-23415",
|
||||
|
|
31
2023/CVE-2023-23416.json
Normal file
31
2023/CVE-2023-23416.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 615741665,
|
||||
"name": "CVE-2023-23416",
|
||||
"full_name": "amitdubey1921\/CVE-2023-23416",
|
||||
"owner": {
|
||||
"login": "amitdubey1921",
|
||||
"id": 105290502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105290502?v=4",
|
||||
"html_url": "https:\/\/github.com\/amitdubey1921"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amitdubey1921\/CVE-2023-23416",
|
||||
"description": "CVE-2023-23415",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-18T14:49:52Z",
|
||||
"updated_at": "2023-03-18T11:37:10Z",
|
||||
"pushed_at": "2023-03-17T12:45:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -27,34 +27,5 @@
|
|||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 611038094,
|
||||
"name": "CVE-2023-23924-sample",
|
||||
"full_name": "zeverse\/CVE-2023-23924-sample",
|
||||
"owner": {
|
||||
"login": "zeverse",
|
||||
"id": 115418435,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115418435?v=4",
|
||||
"html_url": "https:\/\/github.com\/zeverse"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zeverse\/CVE-2023-23924-sample",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-08T01:16:16Z",
|
||||
"updated_at": "2023-03-15T17:26:38Z",
|
||||
"pushed_at": "2023-03-19T18:01:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
32
README.md
32
README.md
|
@ -83,6 +83,14 @@ Es wurde eine kritische Schwachstelle in Drag and Drop Multiple File Upload Cont
|
|||
|
||||
- [Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal](https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal)
|
||||
|
||||
### CVE-2023-1337 (2023-03-10)
|
||||
|
||||
<code>
|
||||
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files.
|
||||
</code>
|
||||
|
||||
- [Penkyzduyi/CVE-2023-1337](https://github.com/Penkyzduyi/CVE-2023-1337)
|
||||
|
||||
### CVE-2023-1415 (2023-03-15)
|
||||
|
||||
<code>
|
||||
|
@ -223,6 +231,10 @@ A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticate
|
|||
### CVE-2023-23138
|
||||
- [OmarAtallahh/CVE-2023-23138](https://github.com/OmarAtallahh/CVE-2023-23138)
|
||||
|
||||
### CVE-2023-23192
|
||||
- [pinarsadioglu/CVE-2023-23192](https://github.com/pinarsadioglu/CVE-2023-23192)
|
||||
- [Penkyzduyi/CVE-2023-23192](https://github.com/Penkyzduyi/CVE-2023-23192)
|
||||
|
||||
### CVE-2023-23279 (2023-02-17)
|
||||
|
||||
<code>
|
||||
|
@ -272,9 +284,16 @@ Microsoft Outlook Elevation of Privilege Vulnerability
|
|||
Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [wh-gov/CVE-2023-23415](https://github.com/wh-gov/CVE-2023-23415)
|
||||
- [amitdubey1921/CVE-2023-23415](https://github.com/amitdubey1921/CVE-2023-23415)
|
||||
|
||||
### CVE-2023-23416 (2023-03-14)
|
||||
|
||||
<code>
|
||||
Windows Cryptographic Services Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [amitdubey1921/CVE-2023-23416](https://github.com/amitdubey1921/CVE-2023-23416)
|
||||
|
||||
### CVE-2023-23488 (2023-01-20)
|
||||
|
||||
<code>
|
||||
|
@ -313,7 +332,6 @@ Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be by
|
|||
</code>
|
||||
|
||||
- [motikan2010/CVE-2023-23924](https://github.com/motikan2010/CVE-2023-23924)
|
||||
- [zeverse/CVE-2023-23924-sample](https://github.com/zeverse/CVE-2023-23924-sample)
|
||||
|
||||
### CVE-2023-24055 (2023-01-21)
|
||||
|
||||
|
@ -4806,6 +4824,14 @@ The Blink1Control2 application <= 2.2.7 uses weak password encryption and an
|
|||
|
||||
- [p1ckzi/CVE-2022-35513](https://github.com/p1ckzi/CVE-2022-35513)
|
||||
|
||||
### CVE-2022-35649 (2022-07-25)
|
||||
|
||||
<code>
|
||||
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
|
||||
</code>
|
||||
|
||||
- [antoinenguyen-09/CVE-2022-35649](https://github.com/antoinenguyen-09/CVE-2022-35649)
|
||||
|
||||
### CVE-2022-35698 (2022-10-14)
|
||||
|
||||
<code>
|
||||
|
@ -12655,6 +12681,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [demining/Log4j-Vulnerability](https://github.com/demining/Log4j-Vulnerability)
|
||||
- [pierpaolosestito-dev/Log4Shell-CVE-2021-44228-PoC](https://github.com/pierpaolosestito-dev/Log4Shell-CVE-2021-44228-PoC)
|
||||
- [Sma-Das/Log4j-PoC](https://github.com/Sma-Das/Log4j-PoC)
|
||||
- [heeloo123/CVE-2021-44228](https://github.com/heeloo123/CVE-2021-44228)
|
||||
|
||||
### CVE-2021-44255 (2022-01-31)
|
||||
|
||||
|
@ -24746,6 +24773,7 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before
|
|||
- [jongmartinez/CVE-2018-11235-PoC](https://github.com/jongmartinez/CVE-2018-11235-PoC)
|
||||
- [MohamedTarekq/test-CVE-2018-11235](https://github.com/MohamedTarekq/test-CVE-2018-11235)
|
||||
- [Yealid/CVE-2018-11235-Git-Submodule-RCE](https://github.com/Yealid/CVE-2018-11235-Git-Submodule-RCE)
|
||||
- [j4k0m/CVE-2018-11235](https://github.com/j4k0m/CVE-2018-11235)
|
||||
- [twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration](https://github.com/twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration)
|
||||
- [SenSecurity/exploit](https://github.com/SenSecurity/exploit)
|
||||
- [EmaVirgRep/CVE-2018-11235](https://github.com/EmaVirgRep/CVE-2018-11235)
|
||||
|
|
Loading…
Add table
Reference in a new issue