mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/08/30 18:44:25
This commit is contained in:
parent
ff37622a31
commit
95a393eebf
50 changed files with 748 additions and 299 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-30T05:47:08Z",
|
||||
"updated_at": "2023-08-30T14:36:39Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1774,
|
||||
"watchers_count": 1774,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1774,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-30T05:47:08Z",
|
||||
"updated_at": "2023-08-30T14:36:39Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1774,
|
||||
"watchers_count": 1774,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1774,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Scan\/Exploit Blueborne CVE-2017-0785",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-04T20:41:12Z",
|
||||
"updated_at": "2022-10-23T09:46:07Z",
|
||||
"updated_at": "2023-08-30T15:31:05Z",
|
||||
"pushed_at": "2018-02-28T07:04:05Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -479,13 +479,13 @@
|
|||
"stargazers_count": 398,
|
||||
"watchers_count": 398,
|
||||
"has_discussions": false,
|
||||
"forks_count": 136,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"forks": 137,
|
||||
"watchers": 398,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-30T05:47:08Z",
|
||||
"updated_at": "2023-08-30T14:36:39Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1774,
|
||||
"watchers_count": 1774,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1774,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-09-22T19:18:47Z",
|
||||
"updated_at": "2022-11-18T11:26:29Z",
|
||||
"updated_at": "2023-08-30T17:25:54Z",
|
||||
"pushed_at": "2018-09-22T21:17:51Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Running CVE-2017-8759 exploit sample.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T09:50:04Z",
|
||||
"updated_at": "2023-07-16T13:11:49Z",
|
||||
"updated_at": "2023-08-30T14:24:19Z",
|
||||
"pushed_at": "2020-01-23T06:53:00Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 257,
|
||||
"watchers": 258,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2023-08-24T14:17:52Z",
|
||||
"updated_at": "2023-08-30T17:57:38Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -587,10 +587,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-30T05:47:08Z",
|
||||
"updated_at": "2023-08-30T14:36:39Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1774,
|
||||
"watchers_count": 1774,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -620,7 +620,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1774,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 231926488,
|
||||
"name": "CVE-2019-10758",
|
||||
"full_name": "lp008\/CVE-2019-10758",
|
||||
"owner": {
|
||||
"login": "lp008",
|
||||
"id": 11436275,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
|
||||
"html_url": "https:\/\/github.com\/lp008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-10758",
|
||||
"description": "CVE-2019-10758",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-05T14:05:56Z",
|
||||
"updated_at": "2021-12-05T21:57:04Z",
|
||||
"pushed_at": "2020-01-05T14:21:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-22T19:14:05Z",
|
||||
"updated_at": "2021-12-05T22:05:57Z",
|
||||
"updated_at": "2023-08-30T14:02:03Z",
|
||||
"pushed_at": "2019-12-22T19:18:35Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
|
|
32
2019/CVE-2019-1215.json
Normal file
32
2019/CVE-2019-1215.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 232197518,
|
||||
"name": "CVE-2019-1215",
|
||||
"full_name": "bluefrostsecurity\/CVE-2019-1215",
|
||||
"owner": {
|
||||
"login": "bluefrostsecurity",
|
||||
"id": 4976074,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
|
||||
"html_url": "https:\/\/github.com\/bluefrostsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2019-1215",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-06T22:34:16Z",
|
||||
"updated_at": "2023-05-22T09:24:46Z",
|
||||
"pushed_at": "2020-01-07T14:29:45Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
32
2019/CVE-2019-13404.json
Normal file
32
2019/CVE-2019-13404.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231223198,
|
||||
"name": "CVE-2019-13404",
|
||||
"full_name": "alidnf\/CVE-2019-13404",
|
||||
"owner": {
|
||||
"login": "alidnf",
|
||||
"id": 54067374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54067374?v=4",
|
||||
"html_url": "https:\/\/github.com\/alidnf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alidnf\/CVE-2019-13404",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-01T14:00:55Z",
|
||||
"updated_at": "2022-11-24T11:11:19Z",
|
||||
"pushed_at": "2020-01-01T14:09:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -209,6 +209,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 231220055,
|
||||
"name": "CVE-2019-16278",
|
||||
"full_name": "NHPT\/CVE-2019-16278",
|
||||
"owner": {
|
||||
"login": "NHPT",
|
||||
"id": 42366434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
|
||||
"html_url": "https:\/\/github.com\/NHPT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
|
||||
"description": "CVE-2019-16278:Nostromo Web服务器的RCE漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-01T13:28:40Z",
|
||||
"updated_at": "2023-01-31T11:26:23Z",
|
||||
"pushed_at": "2020-01-01T13:36:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 251251110,
|
||||
"name": "cve-2019-16278",
|
||||
|
|
32
2019/CVE-2019-17427.json
Normal file
32
2019/CVE-2019-17427.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231651324,
|
||||
"name": "CVE-2019-17427",
|
||||
"full_name": "RealLinkers\/CVE-2019-17427",
|
||||
"owner": {
|
||||
"login": "RealLinkers",
|
||||
"id": 22389074,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealLinkers"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-17427",
|
||||
"description": "CVE-2019-17427 Persistent XSS POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-03T19:25:54Z",
|
||||
"updated_at": "2021-07-17T15:56:02Z",
|
||||
"pushed_at": "2020-01-03T19:32:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2019/CVE-2019-18890.json
Normal file
32
2019/CVE-2019-18890.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231370688,
|
||||
"name": "CVE-2019-18890",
|
||||
"full_name": "RealLinkers\/CVE-2019-18890",
|
||||
"owner": {
|
||||
"login": "RealLinkers",
|
||||
"id": 22389074,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealLinkers"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-18890",
|
||||
"description": "CVE-2019-18890 POC (Proof of Concept)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-02T11:44:47Z",
|
||||
"updated_at": "2023-07-19T22:07:24Z",
|
||||
"pushed_at": "2020-01-06T13:13:58Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2019/CVE-2019-19782.json
Normal file
32
2019/CVE-2019-19782.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 233213627,
|
||||
"name": "CVE-2019-19782",
|
||||
"full_name": "Underwood12\/CVE-2019-19782",
|
||||
"owner": {
|
||||
"login": "Underwood12",
|
||||
"id": 19386296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19386296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Underwood12"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Underwood12\/CVE-2019-19782",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T10:25:18Z",
|
||||
"updated_at": "2020-01-11T10:25:20Z",
|
||||
"pushed_at": "2020-01-10T05:12:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
62
2019/CVE-2019-20197.json
Normal file
62
2019/CVE-2019-20197.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 232512469,
|
||||
"name": "CVE-2019-20197",
|
||||
"full_name": "lp008\/CVE-2019-20197",
|
||||
"owner": {
|
||||
"login": "lp008",
|
||||
"id": 11436275,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
|
||||
"html_url": "https:\/\/github.com\/lp008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-20197",
|
||||
"description": "CVE-2019-20197",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-08T08:11:58Z",
|
||||
"updated_at": "2020-01-08T08:20:44Z",
|
||||
"pushed_at": "2020-01-08T08:19:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 232513269,
|
||||
"name": "CVE-2019-20197",
|
||||
"full_name": "jas502n\/CVE-2019-20197",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-20197",
|
||||
"description": "Nagios XI远程命令执行漏洞 <v5.6.9",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-08T08:16:30Z",
|
||||
"updated_at": "2023-02-28T01:21:42Z",
|
||||
"pushed_at": "2020-01-08T08:30:03Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2019/CVE-2019-20224.json
Normal file
32
2019/CVE-2019-20224.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 233055034,
|
||||
"name": "CVE-2019-20224",
|
||||
"full_name": "mhaskar\/CVE-2019-20224",
|
||||
"owner": {
|
||||
"login": "mhaskar",
|
||||
"id": 6861215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
|
||||
"html_url": "https:\/\/github.com\/mhaskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-20224",
|
||||
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T13:41:28Z",
|
||||
"updated_at": "2023-06-05T10:09:18Z",
|
||||
"pushed_at": "2020-01-10T13:42:12Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-30T05:47:08Z",
|
||||
"updated_at": "2023-08-30T14:36:39Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1774,
|
||||
"watchers_count": 1774,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1774,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 398,
|
||||
"watchers_count": 398,
|
||||
"has_discussions": false,
|
||||
"forks_count": 136,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"forks": 137,
|
||||
"watchers": 398,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
32
2019/CVE-2019-5630.json
Normal file
32
2019/CVE-2019-5630.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 232403416,
|
||||
"name": "CVE-2019-5630",
|
||||
"full_name": "rbeede\/CVE-2019-5630",
|
||||
"owner": {
|
||||
"login": "rbeede",
|
||||
"id": 1429214,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1429214?v=4",
|
||||
"html_url": "https:\/\/github.com\/rbeede"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rbeede\/CVE-2019-5630",
|
||||
"description": "https:\/\/www.rodneybeede.com\/curriculum%20vitae\/bio.html",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-07T19:43:42Z",
|
||||
"updated_at": "2020-01-07T19:44:19Z",
|
||||
"pushed_at": "2020-01-07T19:44:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -514,6 +514,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 232528693,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "geropl\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "geropl",
|
||||
"id": 32448529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32448529?v=4",
|
||||
"html_url": "https:\/\/github.com\/geropl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geropl\/CVE-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-08T09:37:54Z",
|
||||
"updated_at": "2021-10-21T21:43:59Z",
|
||||
"pushed_at": "2020-01-08T10:28:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 238321546,
|
||||
"name": "CVE-2019-5736-Custom-Runtime",
|
||||
|
|
32
2019/CVE-2019-8601.json
Normal file
32
2019/CVE-2019-8601.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 231278850,
|
||||
"name": "CVE-2019-8601",
|
||||
"full_name": "BadAccess11\/CVE-2019-8601",
|
||||
"owner": {
|
||||
"login": "BadAccess11",
|
||||
"id": 59069469,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59069469?v=4",
|
||||
"html_url": "https:\/\/github.com\/BadAccess11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BadAccess11\/CVE-2019-8601",
|
||||
"description": "Exploiting a patched vulnerability in JavaScriptCore",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-02T00:12:22Z",
|
||||
"updated_at": "2023-07-10T12:03:02Z",
|
||||
"pushed_at": "2020-01-02T00:13:22Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -133,7 +133,7 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2023-08-24T10:21:12Z",
|
||||
"updated_at": "2023-08-30T14:09:46Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 644,
|
||||
"watchers_count": 644,
|
||||
|
|
|
@ -10,22 +10,22 @@
|
|||
"html_url": "https:\/\/github.com\/0xdreadnaught"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xdreadnaught\/cve-2020-11060-poc",
|
||||
"description": "Python2 POC for CVE 2020-11060",
|
||||
"description": "Python3 POC for CVE 2020-11060",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-11T14:52:03Z",
|
||||
"updated_at": "2023-08-30T13:36:47Z",
|
||||
"pushed_at": "2023-08-30T13:36:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2023-08-30T15:39:00Z",
|
||||
"pushed_at": "2023-08-30T17:01:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 1075,
|
||||
"watchers_count": 1075,
|
||||
"has_discussions": false,
|
||||
"forks_count": 282,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 282,
|
||||
"forks": 281,
|
||||
"watchers": 1075,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
|
@ -175,13 +175,13 @@
|
|||
"stargazers_count": 554,
|
||||
"watchers_count": 554,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"forks": 143,
|
||||
"watchers": 554,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-30T05:47:08Z",
|
||||
"updated_at": "2023-08-30T14:36:39Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1774,
|
||||
"watchers_count": 1774,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1774,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 311725301,
|
||||
"name": "CVE-2020-28413_Mantis2.24.3-SQLi-SOAP",
|
||||
"full_name": "EthicalHCOP\/CVE-2020-28413_Mantis2.24.3-SQLi-SOAP",
|
||||
"owner": {
|
||||
"login": "EthicalHCOP",
|
||||
"id": 33833733,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33833733?v=4",
|
||||
"html_url": "https:\/\/github.com\/EthicalHCOP"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EthicalHCOP\/CVE-2020-28413_Mantis2.24.3-SQLi-SOAP",
|
||||
"description": "Dicha vulnerabilidad se presentaba en la funcionalidad mc_project_get_users, y su detección es tan solo modificando y enviando el parámetro “access” sin ningún valor y cambiando el tipo de valor a String.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T16:50:55Z",
|
||||
"updated_at": "2020-12-30T14:33:33Z",
|
||||
"pushed_at": "2020-12-30T14:33:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -666,13 +666,13 @@
|
|||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 16,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 355252754,
|
||||
"name": "CVE-2021-30149",
|
||||
"full_name": "orionhridoy\/CVE-2021-30149",
|
||||
"owner": {
|
||||
"login": "orionhridoy",
|
||||
"id": 76449180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76449180?v=4",
|
||||
"html_url": "https:\/\/github.com\/orionhridoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orionhridoy\/CVE-2021-30149",
|
||||
"description": "RCE 0day (Orion Hridoy)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T16:12:03Z",
|
||||
"updated_at": "2021-04-06T16:17:13Z",
|
||||
"pushed_at": "2021-04-06T16:12:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 355253114,
|
||||
"name": "CVE-2021-30150",
|
||||
"full_name": "orionhridoy\/CVE-2021-30150",
|
||||
"owner": {
|
||||
"login": "orionhridoy",
|
||||
"id": 76449180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76449180?v=4",
|
||||
"html_url": "https:\/\/github.com\/orionhridoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orionhridoy\/CVE-2021-30150",
|
||||
"description": "XSS Discovered By: Orion Hridoy",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T16:13:04Z",
|
||||
"updated_at": "2021-04-07T15:43:45Z",
|
||||
"pushed_at": "2021-04-07T15:43:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 337666297,
|
||||
"name": "CVE-2021-3165",
|
||||
"full_name": "orionhridoy\/CVE-2021-3165",
|
||||
"owner": {
|
||||
"login": "orionhridoy",
|
||||
"id": 76449180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76449180?v=4",
|
||||
"html_url": "https:\/\/github.com\/orionhridoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orionhridoy\/CVE-2021-3165",
|
||||
"description": "CVE-2021-3165: SmartAgent 3.1.0 - Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T08:51:00Z",
|
||||
"updated_at": "2021-04-07T15:49:11Z",
|
||||
"pushed_at": "2021-04-07T15:49:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-08-27T10:55:23Z",
|
||||
"updated_at": "2023-08-30T17:15:23Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 722,
|
||||
"watchers": 723,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -9883,10 +9883,10 @@
|
|||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T13:18:49Z",
|
||||
"updated_at": "2023-08-12T17:24:58Z",
|
||||
"updated_at": "2023-08-30T14:34:56Z",
|
||||
"pushed_at": "2022-08-12T20:12:50Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -9895,7 +9895,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-02T15:34:28Z",
|
||||
"updated_at": "2023-08-28T12:21:33Z",
|
||||
"updated_at": "2023-08-30T16:16:55Z",
|
||||
"pushed_at": "2023-02-02T16:53:37Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -811,5 +811,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 685095951,
|
||||
"name": "CVE-2022-46169",
|
||||
"full_name": "a1665454764\/CVE-2022-46169",
|
||||
"owner": {
|
||||
"login": "a1665454764",
|
||||
"id": 143511005,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143511005?v=4",
|
||||
"html_url": "https:\/\/github.com\/a1665454764"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/a1665454764\/CVE-2022-46169",
|
||||
"description": "CVE-2022-46169",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T14:03:41Z",
|
||||
"updated_at": "2023-08-30T14:04:20Z",
|
||||
"pushed_at": "2023-08-30T14:06:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-08-29T11:18:50Z",
|
||||
"updated_at": "2023-08-30T14:07:52Z",
|
||||
"pushed_at": "2023-04-23T17:54:49Z",
|
||||
"stargazers_count": 607,
|
||||
"watchers_count": 607,
|
||||
"stargazers_count": 608,
|
||||
"watchers_count": 608,
|
||||
"has_discussions": false,
|
||||
"forks_count": 99,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 607,
|
||||
"watchers": 608,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 685129397,
|
||||
"name": "CVE-2023-26256",
|
||||
"full_name": "qs119\/CVE-2023-26256",
|
||||
"owner": {
|
||||
"login": "qs119",
|
||||
"id": 143074431,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143074431?v=4",
|
||||
"html_url": "https:\/\/github.com\/qs119"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qs119\/CVE-2023-26256",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T15:21:00Z",
|
||||
"updated_at": "2023-08-30T15:29:48Z",
|
||||
"pushed_at": "2023-08-30T15:29:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-26818 Exploit MacOS TCC Bypass W\/ Telegram",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T12:40:50Z",
|
||||
"updated_at": "2023-08-30T12:44:14Z",
|
||||
"updated_at": "2023-08-30T14:25:35Z",
|
||||
"pushed_at": "2023-08-30T12:50:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -298,10 +298,10 @@
|
|||
"description": "A tool to perform port scanning using vulnerable Request-Baskets",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T16:19:21Z",
|
||||
"updated_at": "2023-08-30T12:34:38Z",
|
||||
"updated_at": "2023-08-30T15:04:05Z",
|
||||
"pushed_at": "2023-08-28T17:52:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -310,7 +310,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T20:15:36Z",
|
||||
"updated_at": "2023-08-25T02:47:44Z",
|
||||
"updated_at": "2023-08-30T16:43:37Z",
|
||||
"pushed_at": "2023-06-20T21:32:56Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 92,
|
||||
"forks": 21,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -181,5 +181,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 685163840,
|
||||
"name": "CVE-2023-32784",
|
||||
"full_name": "4m4Sec\/CVE-2023-32784",
|
||||
"owner": {
|
||||
"login": "4m4Sec",
|
||||
"id": 52249849,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4",
|
||||
"html_url": "https:\/\/github.com\/4m4Sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/4m4Sec\/CVE-2023-32784",
|
||||
"description": "Retrieve the master password of a keepass database <= 2.53.1",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T16:42:19Z",
|
||||
"updated_at": "2023-08-30T16:43:25Z",
|
||||
"pushed_at": "2023-08-30T16:46:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-05T13:44:50Z",
|
||||
"updated_at": "2023-07-22T01:50:46Z",
|
||||
"updated_at": "2023-08-30T14:47:13Z",
|
||||
"pushed_at": "2023-07-05T13:49:03Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "'Hacking' a 7-Eleven Bluetooth Smart Cup | CVE-2023-34761",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-04T18:37:39Z",
|
||||
"updated_at": "2023-06-29T14:15:28Z",
|
||||
"updated_at": "2023-08-30T15:43:44Z",
|
||||
"pushed_at": "2023-06-23T00:10:55Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T12:07:40Z",
|
||||
"updated_at": "2023-08-30T00:44:46Z",
|
||||
"updated_at": "2023-08-30T15:04:30Z",
|
||||
"pushed_at": "2023-08-23T16:46:53Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T22:24:34Z",
|
||||
"updated_at": "2023-08-30T13:18:51Z",
|
||||
"updated_at": "2023-08-30T18:33:37Z",
|
||||
"pushed_at": "2023-08-25T00:30:01Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 125,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-26T05:51:06Z",
|
||||
"updated_at": "2023-08-30T11:53:55Z",
|
||||
"updated_at": "2023-08-30T15:43:17Z",
|
||||
"pushed_at": "2023-08-27T00:41:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,12 +43,12 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-08-30T13:59:42Z",
|
||||
"pushed_at": "2023-08-30T05:41:02Z",
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"updated_at": "2023-08-30T18:25:36Z",
|
||||
"pushed_at": "2023-08-30T14:20:43Z",
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -58,8 +58,8 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 468,
|
||||
"forks": 66,
|
||||
"watchers": 478,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T14:08:36Z",
|
||||
"updated_at": "2023-08-30T11:29:48Z",
|
||||
"updated_at": "2023-08-30T15:18:31Z",
|
||||
"pushed_at": "2023-08-27T14:35:00Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -137,12 +137,12 @@
|
|||
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T21:49:37Z",
|
||||
"updated_at": "2023-08-30T12:19:29Z",
|
||||
"updated_at": "2023-08-30T17:51:32Z",
|
||||
"pushed_at": "2023-08-27T22:17:56Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -155,8 +155,8 @@
|
|||
"winrar"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 71,
|
||||
"forks": 16,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -234,10 +234,10 @@
|
|||
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T14:48:22Z",
|
||||
"updated_at": "2023-08-30T12:34:52Z",
|
||||
"updated_at": "2023-08-30T16:43:22Z",
|
||||
"pushed_at": "2023-08-28T15:33:27Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -246,7 +246,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -324,10 +324,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator and get reverse shell",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T22:08:31Z",
|
||||
"updated_at": "2023-08-30T00:03:38Z",
|
||||
"updated_at": "2023-08-30T18:20:30Z",
|
||||
"pushed_at": "2023-08-28T23:51:31Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -336,7 +336,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -459,5 +459,41 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 685043786,
|
||||
"name": "CVE-2023-38831-PoC",
|
||||
"full_name": "z3r0sw0rd\/CVE-2023-38831-PoC",
|
||||
"owner": {
|
||||
"login": "z3r0sw0rd",
|
||||
"id": 18899200,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18899200?v=4",
|
||||
"html_url": "https:\/\/github.com\/z3r0sw0rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z3r0sw0rd\/CVE-2023-38831-PoC",
|
||||
"description": "Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T11:52:23Z",
|
||||
"updated_at": "2023-08-30T14:09:43Z",
|
||||
"pushed_at": "2023-08-30T14:08:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"archive",
|
||||
"cve-2023-38831",
|
||||
"exploit",
|
||||
"remote-code-execution",
|
||||
"winrar"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,19 +43,19 @@
|
|||
"description": "CVE-2023-40477 PoC by Wild-Pointer",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-29T16:29:48Z",
|
||||
"updated_at": "2023-08-30T12:55:34Z",
|
||||
"pushed_at": "2023-08-30T13:04:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2023-08-30T16:29:36Z",
|
||||
"pushed_at": "2023-08-30T14:34:32Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-08-26T15:11:31Z",
|
||||
"updated_at": "2023-08-30T11:04:56Z",
|
||||
"pushed_at": "2023-08-28T13:58:22Z",
|
||||
"pushed_at": "2023-08-30T15:21:34Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
|
|
99
README.md
99
README.md
|
@ -1176,6 +1176,7 @@
|
|||
|
||||
- [aodsec/CVE-2023-26256](https://github.com/aodsec/CVE-2023-26256)
|
||||
- [xhs-d/CVE-2023-26256](https://github.com/xhs-d/CVE-2023-26256)
|
||||
- [qs119/CVE-2023-26256](https://github.com/qs119/CVE-2023-26256)
|
||||
|
||||
### CVE-2023-26258 (2023-07-03)
|
||||
|
||||
|
@ -2063,6 +2064,7 @@
|
|||
- [z-jxy/keepass_dump](https://github.com/z-jxy/keepass_dump)
|
||||
- [LeDocteurDesBits/cve-2023-32784](https://github.com/LeDocteurDesBits/cve-2023-32784)
|
||||
- [hau-zy/KeePass-dump-py](https://github.com/hau-zy/KeePass-dump-py)
|
||||
- [4m4Sec/CVE-2023-32784](https://github.com/4m4Sec/CVE-2023-32784)
|
||||
|
||||
### CVE-2023-32961 (2023-06-12)
|
||||
|
||||
|
@ -2857,6 +2859,7 @@
|
|||
- [MortySecurity/CVE-2023-38831-Exploit-and-Detection](https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection)
|
||||
- [nhman-python/CVE-2023-38831](https://github.com/nhman-python/CVE-2023-38831)
|
||||
- [Ahmed1Al/CVE-2023-38831-winrar-exploit](https://github.com/Ahmed1Al/CVE-2023-38831-winrar-exploit)
|
||||
- [z3r0sw0rd/CVE-2023-38831-PoC](https://github.com/z3r0sw0rd/CVE-2023-38831-PoC)
|
||||
|
||||
### CVE-2023-38836 (2023-08-21)
|
||||
|
||||
|
@ -8850,6 +8853,7 @@
|
|||
- [Rickster5555/EH2-PoC](https://github.com/Rickster5555/EH2-PoC)
|
||||
- [antisecc/CVE-2022-46169](https://github.com/antisecc/CVE-2022-46169)
|
||||
- [4m4Sec/CVE-2022-46169](https://github.com/4m4Sec/CVE-2022-46169)
|
||||
- [a1665454764/CVE-2022-46169](https://github.com/a1665454764/CVE-2022-46169)
|
||||
|
||||
### CVE-2022-46175 (2022-12-23)
|
||||
|
||||
|
@ -9950,13 +9954,6 @@
|
|||
|
||||
- [rmccarth/cve-2021-3164](https://github.com/rmccarth/cve-2021-3164)
|
||||
|
||||
### CVE-2021-3165 (2021-01-26)
|
||||
|
||||
<code>SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
|
||||
</code>
|
||||
|
||||
- [orionhridoy/CVE-2021-3165](https://github.com/orionhridoy/CVE-2021-3165)
|
||||
|
||||
### CVE-2021-3166 (2021-01-17)
|
||||
|
||||
<code>An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, resulting in a persistent outage of those services.
|
||||
|
@ -11990,20 +11987,6 @@
|
|||
|
||||
- [Security-AVS/CVE-2021-30146](https://github.com/Security-AVS/CVE-2021-30146)
|
||||
|
||||
### CVE-2021-30149 (2021-04-06)
|
||||
|
||||
<code>Composr 10.0.36 allows upload and execution of PHP files.
|
||||
</code>
|
||||
|
||||
- [orionhridoy/CVE-2021-30149](https://github.com/orionhridoy/CVE-2021-30149)
|
||||
|
||||
### CVE-2021-30150 (2021-04-06)
|
||||
|
||||
<code>Composr 10.0.36 allows XSS in an XML script.
|
||||
</code>
|
||||
|
||||
- [orionhridoy/CVE-2021-30150](https://github.com/orionhridoy/CVE-2021-30150)
|
||||
|
||||
### CVE-2021-30190 (2021-05-25)
|
||||
|
||||
<code>CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.
|
||||
|
@ -20109,13 +20092,6 @@
|
|||
|
||||
- [dievus/CVE-2020-28351](https://github.com/dievus/CVE-2020-28351)
|
||||
|
||||
### CVE-2020-28413 (2020-12-30)
|
||||
|
||||
<code>In MantisBT 2.24.3, SQL Injection can occur in the parameter "access" of the mc_project_get_users function through the API SOAP.
|
||||
</code>
|
||||
|
||||
- [EthicalHCOP/CVE-2020-28413_Mantis2.24.3-SQLi-SOAP](https://github.com/EthicalHCOP/CVE-2020-28413_Mantis2.24.3-SQLi-SOAP)
|
||||
|
||||
### CVE-2020-28414 (2020-11-12)
|
||||
|
||||
<code>A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Payment Gateway 3.1.12.3.2. A remote unauthenticated attacker is able to execute arbitrary HTML code via crafted url (different vector than CVE-2020-28415).
|
||||
|
@ -20905,6 +20881,13 @@
|
|||
|
||||
- [info4mationprivate8tools/CVE-2019-1205](https://github.com/info4mationprivate8tools/CVE-2019-1205)
|
||||
|
||||
### CVE-2019-1215 (2019-09-11)
|
||||
|
||||
<code>An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.
|
||||
</code>
|
||||
|
||||
- [bluefrostsecurity/CVE-2019-1215](https://github.com/bluefrostsecurity/CVE-2019-1215)
|
||||
|
||||
### CVE-2019-1218 (2019-08-14)
|
||||
|
||||
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages, aka 'Outlook iOS Spoofing Vulnerability'.
|
||||
|
@ -21428,6 +21411,13 @@
|
|||
|
||||
- [VoidSec/CVE-2019-5624](https://github.com/VoidSec/CVE-2019-5624)
|
||||
|
||||
### CVE-2019-5630 (2019-07-03)
|
||||
|
||||
<code>A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request.
|
||||
</code>
|
||||
|
||||
- [rbeede/CVE-2019-5630](https://github.com/rbeede/CVE-2019-5630)
|
||||
|
||||
### CVE-2019-5700 (2019-10-09)
|
||||
|
||||
<code>NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.
|
||||
|
@ -21457,6 +21447,7 @@
|
|||
- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study)
|
||||
- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc)
|
||||
- [epsteina16/Docker-Escape-Miner](https://github.com/epsteina16/Docker-Escape-Miner)
|
||||
- [geropl/CVE-2019-5736](https://github.com/geropl/CVE-2019-5736)
|
||||
- [GiverOfGifts/CVE-2019-5736-Custom-Runtime](https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime)
|
||||
- [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC)
|
||||
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
|
||||
|
@ -21877,6 +21868,13 @@
|
|||
|
||||
- [jsherman212/used_sock](https://github.com/jsherman212/used_sock)
|
||||
|
||||
### CVE-2019-8601 (2019-12-18)
|
||||
|
||||
<code>Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
|
||||
</code>
|
||||
|
||||
- [BadAccess11/CVE-2019-8601](https://github.com/BadAccess11/CVE-2019-8601)
|
||||
|
||||
### CVE-2019-8605 (2019-12-18)
|
||||
|
||||
<code>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.
|
||||
|
@ -22309,6 +22307,7 @@
|
|||
</code>
|
||||
|
||||
- [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758)
|
||||
- [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758)
|
||||
|
||||
### CVE-2019-10779 (2020-01-27)
|
||||
|
||||
|
@ -22959,6 +22958,13 @@
|
|||
|
||||
- [B3Bo1d/CVE-2019-13403](https://github.com/B3Bo1d/CVE-2019-13403)
|
||||
|
||||
### CVE-2019-13404 (2019-07-07)
|
||||
|
||||
<code>** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.
|
||||
</code>
|
||||
|
||||
- [alidnf/CVE-2019-13404](https://github.com/alidnf/CVE-2019-13404)
|
||||
|
||||
### CVE-2019-13496 (2019-11-04)
|
||||
|
||||
<code>One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response.
|
||||
|
@ -23446,6 +23452,7 @@
|
|||
- [AnubisSec/CVE-2019-16278](https://github.com/AnubisSec/CVE-2019-16278)
|
||||
- [theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE](https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE)
|
||||
- [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278)
|
||||
- [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278)
|
||||
- [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278)
|
||||
- [crypticdante/CVE-2019-16278](https://github.com/crypticdante/CVE-2019-16278)
|
||||
- [alexander-fernandes/CVE-2019-16278](https://github.com/alexander-fernandes/CVE-2019-16278)
|
||||
|
@ -23646,6 +23653,13 @@
|
|||
|
||||
- [mavlevin/CVE-2019-17424](https://github.com/mavlevin/CVE-2019-17424)
|
||||
|
||||
### CVE-2019-17427 (2019-10-09)
|
||||
|
||||
<code>In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to textile formatting errors.
|
||||
</code>
|
||||
|
||||
- [RealLinkers/CVE-2019-17427](https://github.com/RealLinkers/CVE-2019-17427)
|
||||
|
||||
### CVE-2019-17495 (2019-10-10)
|
||||
|
||||
<code>A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
|
||||
|
@ -23866,6 +23880,13 @@
|
|||
|
||||
- [bobfuzzer/CVE-2019-18885](https://github.com/bobfuzzer/CVE-2019-18885)
|
||||
|
||||
### CVE-2019-18890 (2019-11-21)
|
||||
|
||||
<code>A SQL injection vulnerability in Redmine through 3.2.9 and 3.3.x before 3.3.10 allows Redmine users to access protected information via a crafted object query.
|
||||
</code>
|
||||
|
||||
- [RealLinkers/CVE-2019-18890](https://github.com/RealLinkers/CVE-2019-18890)
|
||||
|
||||
### CVE-2019-18935 (2019-12-11)
|
||||
|
||||
<code>Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
|
||||
|
@ -24108,6 +24129,13 @@
|
|||
- [Vulnmachines/Ctirix_RCE-CVE-2019-19781](https://github.com/Vulnmachines/Ctirix_RCE-CVE-2019-19781)
|
||||
- [k-fire/CVE-2019-19781-exploit](https://github.com/k-fire/CVE-2019-19781-exploit)
|
||||
|
||||
### CVE-2019-19782 (2019-12-13)
|
||||
|
||||
<code>The FTP client in AceaXe Plus 1.0 allows a buffer overflow via a long EHLO response from an FTP server.
|
||||
</code>
|
||||
|
||||
- [Underwood12/CVE-2019-19782](https://github.com/Underwood12/CVE-2019-19782)
|
||||
|
||||
### CVE-2019-19844 (2019-12-18)
|
||||
|
||||
<code>Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
|
||||
|
@ -24155,6 +24183,21 @@
|
|||
|
||||
- [AleDiBen/NVMS1000-Exploit](https://github.com/AleDiBen/NVMS1000-Exploit)
|
||||
|
||||
### CVE-2019-20197 (2019-12-31)
|
||||
|
||||
<code>In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.
|
||||
</code>
|
||||
|
||||
- [lp008/CVE-2019-20197](https://github.com/lp008/CVE-2019-20197)
|
||||
- [jas502n/CVE-2019-20197](https://github.com/jas502n/CVE-2019-20197)
|
||||
|
||||
### CVE-2019-20224 (2020-01-09)
|
||||
|
||||
<code>netflow_get_stats in functions_netflow.php in Pandora FMS 7.0NG allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ip_src parameter in an index.php?operation/netflow/nf_live_view request. This issue has been fixed in Pandora FMS 7.0 NG 742.
|
||||
</code>
|
||||
|
||||
- [mhaskar/CVE-2019-20224](https://github.com/mhaskar/CVE-2019-20224)
|
||||
|
||||
### CVE-2019-20326 (2020-03-16)
|
||||
|
||||
<code>A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.
|
||||
|
|
Loading…
Reference in a new issue