Auto Update 2023/07/26 00:25:43

This commit is contained in:
motikan2010-bot 2023-07-26 09:25:43 +09:00
parent 1b6057ed03
commit 9623bdcb80
32 changed files with 257 additions and 125 deletions

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2023-07-21T19:28:33Z",
"updated_at": "2023-07-25T18:09:59Z",
"pushed_at": "2023-05-07T11:39:29Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 151,
"watchers_count": 151,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 150,
"watchers": 151,
"score": 0,
"subscribers_count": 7
}

View file

@ -689,6 +689,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 18714630,
"name": "bleeding_onions",
"full_name": "wwwiretap\/bleeding_onions",
"owner": {
"login": "wwwiretap",
"id": 210109,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210109?v=4",
"html_url": "https:\/\/github.com\/wwwiretap"
},
"html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions",
"description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160",
"fork": false,
"created_at": "2014-04-12T21:04:55Z",
"updated_at": "2014-09-09T17:32:17Z",
"pushed_at": "2014-04-13T14:57:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 3
},
{
"id": 18722665,
"name": "heatbleeding",
@ -779,6 +809,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 18794584,
"name": "-Heartbleed-",
"full_name": "indiw0rm\/-Heartbleed-",
"owner": {
"login": "indiw0rm",
"id": 7300510,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7300510?v=4",
"html_url": "https:\/\/github.com\/indiw0rm"
},
"html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-",
"description": "A checker (site and tool) for CVE-2014-0160: ",
"fork": false,
"created_at": "2014-04-15T09:30:40Z",
"updated_at": "2014-04-15T09:30:40Z",
"pushed_at": "2014-04-15T09:30:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 18802435,
"name": "heartbleed-tools",

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 18869401,
"name": "cve-2014-2734",
"full_name": "adrienthebo\/cve-2014-2734",
"owner": {
"login": "adrienthebo",
"id": 172194,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172194?v=4",
"html_url": "https:\/\/github.com\/adrienthebo"
},
"html_url": "https:\/\/github.com\/adrienthebo\/cve-2014-2734",
"description": "I think this CVE is full of lies and deceit and very confusing code.",
"fork": false,
"created_at": "2014-04-17T06:51:01Z",
"updated_at": "2023-01-28T20:50:55Z",
"pushed_at": "2014-04-17T07:07:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -238,13 +238,13 @@
"stargazers_count": 444,
"watchers_count": 444,
"has_discussions": false,
"forks_count": 150,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 150,
"forks": 151,
"watchers": 444,
"score": 0,
"subscribers_count": 20
@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-07-23T23:17:55Z",
"updated_at": "2023-07-25T20:57:38Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 753,
"watchers_count": 753,
"stargazers_count": 754,
"watchers_count": 754,
"has_discussions": false,
"forks_count": 436,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 436,
"watchers": 753,
"watchers": 754,
"score": 0,
"subscribers_count": 11
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ",
"fork": false,
"created_at": "2017-11-19T16:50:39Z",
"updated_at": "2023-07-03T11:55:46Z",
"updated_at": "2023-07-25T23:11:33Z",
"pushed_at": "2022-03-07T20:04:08Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,34 +1,4 @@
[
{
"id": 167275161,
"name": "check_CVE-2019-3462",
"full_name": "tonejito\/check_CVE-2019-3462",
"owner": {
"login": "tonejito",
"id": 618588,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/618588?v=4",
"html_url": "https:\/\/github.com\/tonejito"
},
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
"fork": false,
"created_at": "2019-01-24T00:30:15Z",
"updated_at": "2022-09-01T09:06:26Z",
"pushed_at": "2019-01-26T01:21:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 170573944,
"name": "update-apt-package",

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2023-07-18T17:02:01Z",
"updated_at": "2023-07-25T20:30:07Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 636,
"watchers_count": 636,
"stargazers_count": 637,
"watchers_count": 637,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 160,
"watchers": 636,
"watchers": 637,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2023-07-15T04:47:13Z",
"updated_at": "2023-07-25T23:20:30Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 684,
"watchers_count": 684,
"stargazers_count": 685,
"watchers_count": 685,
"has_discussions": false,
"forks_count": 172,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 684,
"watchers": 685,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false,
"created_at": "2020-06-01T04:44:05Z",
"updated_at": "2023-07-10T03:06:43Z",
"updated_at": "2023-07-25T23:36:48Z",
"pushed_at": "2020-06-17T00:56:08Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 184,
"watchers": 185,
"score": 0,
"subscribers_count": 5
},

View file

@ -133,10 +133,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2023-07-24T23:50:29Z",
"updated_at": "2023-07-25T20:48:50Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 65,
"watchers": 349,
"watchers": 350,
"score": 0,
"subscribers_count": 8
},
@ -1868,7 +1868,7 @@
"fork": false,
"created_at": "2023-02-26T11:49:44Z",
"updated_at": "2023-03-06T10:23:44Z",
"pushed_at": "2023-07-15T00:55:25Z",
"pushed_at": "2023-07-25T19:38:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -79,8 +79,8 @@
"description": "WordPress Sites Vulnerability Checker for CVE-2020-35489",
"fork": false,
"created_at": "2023-05-31T02:12:26Z",
"updated_at": "2023-07-07T14:35:38Z",
"pushed_at": "2023-07-18T16:53:38Z",
"updated_at": "2023-07-25T23:36:58Z",
"pushed_at": "2023-07-26T00:05:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": true,

62
2020/CVE-2020-8644.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 670804361,
"name": "CVE-2020-8644-PlaySMS-1.4-rlvpp",
"full_name": "hheeyywweellccoommee\/CVE-2020-8644-PlaySMS-1.4-rlvpp",
"owner": {
"login": "hheeyywweellccoommee",
"id": 131327252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131327252?v=4",
"html_url": "https:\/\/github.com\/hheeyywweellccoommee"
},
"html_url": "https:\/\/github.com\/hheeyywweellccoommee\/CVE-2020-8644-PlaySMS-1.4-rlvpp",
"description": "Python script to exploit PlaySMS before 1.4.3",
"fork": false,
"created_at": "2023-07-25T22:01:01Z",
"updated_at": "2023-07-25T22:01:02Z",
"pushed_at": "2023-07-25T21:38:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 670819223,
"name": "CVE-2020-8644-PlaySMS-1.4",
"full_name": "H3rm1tR3b0rn\/CVE-2020-8644-PlaySMS-1.4",
"owner": {
"login": "H3rm1tR3b0rn",
"id": 17506633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17506633?v=4",
"html_url": "https:\/\/github.com\/H3rm1tR3b0rn"
},
"html_url": "https:\/\/github.com\/H3rm1tR3b0rn\/CVE-2020-8644-PlaySMS-1.4",
"description": "Python script to exploit PlaySMS before 1.4.3",
"fork": false,
"created_at": "2023-07-25T23:11:51Z",
"updated_at": "2023-07-25T23:13:20Z",
"pushed_at": "2023-07-25T23:34:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -776,7 +776,7 @@
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
},
{
"id": 385174791,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-25T09:44:23Z",
"updated_at": "2023-07-26T00:17:15Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 979,
"watchers_count": 979,
"has_discussions": false,
"forks_count": 126,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 126,
"watchers": 978,
"watchers": 979,
"score": 0,
"subscribers_count": 9
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
"updated_at": "2023-05-13T14:01:02Z",
"updated_at": "2023-07-25T19:26:06Z",
"pushed_at": "2023-06-29T15:57:12Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 1
},

View file

@ -2458,10 +2458,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2023-07-07T02:05:07Z",
"updated_at": "2023-07-25T23:36:35Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -2479,7 +2479,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 1
},
@ -3476,11 +3476,11 @@
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-41773-EXPLOIT",
"description": "A PoC exploit for CVE-2021-41773 - Directory Traversal\/RCE Apache version 2.4.49\/2.4.50",
"description": "A PoC exploit for CVE-2021-41773 - RCE Apache version 2.4.49\/2.4.50",
"fork": false,
"created_at": "2023-05-06T17:46:29Z",
"updated_at": "2023-07-25T14:48:43Z",
"pushed_at": "2023-07-25T14:47:11Z",
"updated_at": "2023-07-25T20:59:37Z",
"pushed_at": "2023-07-25T21:01:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1428,7 +1428,7 @@
"stargazers_count": 850,
"watchers_count": 850,
"has_discussions": false,
"forks_count": 178,
"forks_count": 177,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1447,7 +1447,7 @@
"scanner"
],
"visibility": "public",
"forks": 178,
"forks": 177,
"watchers": 850,
"score": 0,
"subscribers_count": 32
@ -10216,7 +10216,7 @@
"fork": false,
"created_at": "2021-12-27T16:45:58Z",
"updated_at": "2022-01-04T14:50:09Z",
"pushed_at": "2022-10-05T19:03:36Z",
"pushed_at": "2023-07-25T20:05:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-44735",
"fork": false,
"created_at": "2023-07-20T09:20:13Z",
"updated_at": "2023-07-25T17:23:54Z",
"updated_at": "2023-07-26T00:14:04Z",
"pushed_at": "2023-07-23T10:15:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -348,7 +348,7 @@
"fork": false,
"created_at": "2022-10-29T18:25:26Z",
"updated_at": "2023-05-06T12:14:50Z",
"pushed_at": "2023-05-23T04:06:51Z",
"pushed_at": "2023-07-25T20:46:14Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-25T09:44:23Z",
"updated_at": "2023-07-26T00:17:15Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 979,
"watchers_count": 979,
"has_discussions": false,
"forks_count": 126,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 126,
"watchers": 978,
"watchers": 979,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "iTop < 2.7.6 - (Authenticated) Remote command execution",
"fork": false,
"created_at": "2022-09-02T07:46:36Z",
"updated_at": "2022-11-09T18:16:12Z",
"updated_at": "2023-07-25T22:43:08Z",
"pushed_at": "2022-09-02T07:48:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 254,
"watchers_count": 254,
"has_discussions": false,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 254,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2023-20126",
"fork": false,
"created_at": "2023-05-17T08:59:40Z",
"updated_at": "2023-07-25T15:38:22Z",
"updated_at": "2023-07-26T00:11:13Z",
"pushed_at": "2023-06-20T12:45:45Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -163,10 +163,10 @@
"description": "Repository with everything I have tracking the impact of MOVEit CVE-2023-34362",
"fork": false,
"created_at": "2023-06-16T00:39:37Z",
"updated_at": "2023-06-19T10:15:51Z",
"updated_at": "2023-07-25T20:51:32Z",
"pushed_at": "2023-06-19T16:11:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 30,
"score": 0,
"subscribers_count": 1
@ -172,13 +172,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "POC of CVE-2023-35086 only DoS",
"fork": false,
"created_at": "2023-07-25T01:36:07Z",
"updated_at": "2023-07-25T16:48:53Z",
"updated_at": "2023-07-25T23:54:26Z",
"pushed_at": "2023-07-25T01:42:02Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 14,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Citrix Scanner for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T13:16:38Z",
"updated_at": "2023-07-25T02:44:30Z",
"updated_at": "2023-07-25T20:06:06Z",
"pushed_at": "2023-07-24T11:49:37Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Cloudpanel 0-day Exploit",
"fork": false,
"created_at": "2023-06-08T09:20:22Z",
"updated_at": "2023-07-25T11:32:16Z",
"updated_at": "2023-07-25T21:06:18Z",
"pushed_at": "2023-07-24T01:43:17Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-07-21T01:53:10Z",
"updated_at": "2023-07-25T15:35:11Z",
"pushed_at": "2023-07-25T15:34:41Z",
"pushed_at": "2023-07-25T22:16:44Z",
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,

View file

@ -16738,6 +16738,14 @@
- [DXY0411/CVE-2020-8637](https://github.com/DXY0411/CVE-2020-8637)
### CVE-2020-8644 (2020-02-05)
<code>PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
</code>
- [hheeyywweellccoommee/CVE-2020-8644-PlaySMS-1.4-rlvpp](https://github.com/hheeyywweellccoommee/CVE-2020-8644-PlaySMS-1.4-rlvpp)
- [H3rm1tR3b0rn/CVE-2020-8644-PlaySMS-1.4](https://github.com/H3rm1tR3b0rn/CVE-2020-8644-PlaySMS-1.4)
### CVE-2020-8809 (2020-02-25)
<code>Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810.
@ -20477,7 +20485,6 @@
<code>Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
</code>
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
### CVE-2019-3663 (2019-11-13)
@ -31115,9 +31122,11 @@
- [sammyfung/openssl-heartbleed-fix](https://github.com/sammyfung/openssl-heartbleed-fix)
- [a0726h77/heartbleed-test](https://github.com/a0726h77/heartbleed-test)
- [hreese/heartbleed-dtls](https://github.com/hreese/heartbleed-dtls)
- [wwwiretap/bleeding_onions](https://github.com/wwwiretap/bleeding_onions)
- [idkqh7/heatbleeding](https://github.com/idkqh7/heatbleeding)
- [GeeksXtreme/ssl-heartbleed.nse](https://github.com/GeeksXtreme/ssl-heartbleed.nse)
- [xlucas/heartbleed](https://github.com/xlucas/heartbleed)
- [indiw0rm/-Heartbleed-](https://github.com/indiw0rm/-Heartbleed-)
- [einaros/heartbleed-tools](https://github.com/einaros/heartbleed-tools)
- [mozilla-services/Heartbleed](https://github.com/mozilla-services/Heartbleed)
- [yryz/heartbleed.js](https://github.com/yryz/heartbleed.js)
@ -31341,6 +31350,7 @@
</code>
- [gdisneyleugers/CVE-2014-2734](https://github.com/gdisneyleugers/CVE-2014-2734)
- [adrienthebo/cve-2014-2734](https://github.com/adrienthebo/cve-2014-2734)
### CVE-2014-2815 (2014-08-12)