mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/10/19 13:11:14
This commit is contained in:
parent
e7d7f69513
commit
964e798d7b
89 changed files with 278 additions and 1969 deletions
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 1806,
|
||||
"watchers_count": 1806,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -75,7 +75,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"forks": 336,
|
||||
"watchers": 1806,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2023-10-14T01:55:01Z",
|
||||
"updated_at": "2023-10-19T07:34:57Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 330,
|
||||
"watchers": 331,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -55,10 +55,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-10T11:27:23Z",
|
||||
"updated_at": "2023-09-20T06:29:48Z",
|
||||
"updated_at": "2023-10-19T09:16:27Z",
|
||||
"pushed_at": "2023-09-18T07:50:03Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1806,
|
||||
"watchers_count": 1806,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"forks": 336,
|
||||
"watchers": 1806,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2023-10-14T01:55:01Z",
|
||||
"updated_at": "2023-10-19T07:34:57Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 330,
|
||||
"watchers": 331,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-06T07:59:07Z",
|
||||
"updated_at": "2023-09-27T07:21:32Z",
|
||||
"updated_at": "2023-10-19T08:13:57Z",
|
||||
"pushed_at": "2017-10-06T09:47:43Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC exploit for CVE-2016-4622",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-09T15:22:06Z",
|
||||
"updated_at": "2023-10-16T06:37:06Z",
|
||||
"updated_at": "2023-10-19T06:08:46Z",
|
||||
"pushed_at": "2023-09-18T16:58:56Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 96,
|
||||
"watchers": 97,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -59,6 +59,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 66317906,
|
||||
"name": "challack",
|
||||
"full_name": "jduck\/challack",
|
||||
"owner": {
|
||||
"login": "jduck",
|
||||
"id": 479840,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/479840?v=4",
|
||||
"html_url": "https:\/\/github.com\/jduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jduck\/challack",
|
||||
"description": "Proof-of-concept exploit code for CVE-2016-5696",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-23T00:21:18Z",
|
||||
"updated_at": "2023-09-28T10:35:51Z",
|
||||
"pushed_at": "2016-08-30T06:32:43Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 66661635,
|
||||
"name": "chackd",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 137769369,
|
||||
"name": "PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"owner": {
|
||||
"login": "RicterZ",
|
||||
"id": 5282759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
|
||||
"html_url": "https:\/\/github.com\/RicterZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"description": "Demo-ing CVE-2017-1000253 in a container",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T15:22:01Z",
|
||||
"updated_at": "2023-06-01T08:36:39Z",
|
||||
"pushed_at": "2017-11-01T07:59:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 552591833,
|
||||
"name": "CVE-2017-1000253",
|
||||
|
|
|
@ -149,36 +149,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 116099094,
|
||||
"name": "weblogic_wls_wsat_rce",
|
||||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||||
"owner": {
|
||||
"login": "cjjduck",
|
||||
"id": 23519154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
|
||||
"html_url": "https:\/\/github.com\/cjjduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-10-09T02:33:00Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116430643,
|
||||
"name": "CVE-2017-10271",
|
||||
|
@ -449,13 +419,13 @@
|
|||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"has_discussions": false,
|
||||
"forks_count": 156,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 156,
|
||||
"forks": 157,
|
||||
"watchers": 404,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 116118639,
|
||||
"name": "CVE-2017-16997-poc",
|
||||
"full_name": "Xiami2012\/CVE-2017-16997-poc",
|
||||
"owner": {
|
||||
"login": "Xiami2012",
|
||||
"id": 1927254,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xiami2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
|
||||
"description": "A proof-of-concept for CVE-2017-16997",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T09:31:55Z",
|
||||
"updated_at": "2018-01-03T09:33:01Z",
|
||||
"pushed_at": "2018-01-03T10:39:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -118,35 +118,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 115962692,
|
||||
"name": "CVE-2017-3881",
|
||||
"full_name": "1337g\/CVE-2017-3881",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881",
|
||||
"description": "credit to artkond",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T01:45:15Z",
|
||||
"updated_at": "2022-04-11T12:16:38Z",
|
||||
"pushed_at": "2018-01-02T01:46:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -35,96 +35,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 41
|
||||
},
|
||||
{
|
||||
"id": 116268310,
|
||||
"name": "Spectre-PoC",
|
||||
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"owner": {
|
||||
"login": "EdwardOwusuAdjei",
|
||||
"id": 16462560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T14:20:13Z",
|
||||
"updated_at": "2023-09-28T10:47:11Z",
|
||||
"pushed_at": "2018-01-04T14:27:29Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 116347505,
|
||||
"name": "spectre-attack-example",
|
||||
"full_name": "poilynx\/spectre-attack-example",
|
||||
"owner": {
|
||||
"login": "poilynx",
|
||||
"id": 8926090,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
|
||||
"html_url": "https:\/\/github.com\/poilynx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
|
||||
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T05:51:34Z",
|
||||
"updated_at": "2021-02-24T01:25:15Z",
|
||||
"pushed_at": "2018-01-05T05:56:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116442461,
|
||||
"name": "spectre-attack-demo",
|
||||
"full_name": "pedrolucasoliva\/spectre-attack-demo",
|
||||
"owner": {
|
||||
"login": "pedrolucasoliva",
|
||||
"id": 10757421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4",
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T01:08:15Z",
|
||||
"updated_at": "2018-01-15T06:12:51Z",
|
||||
"pushed_at": "2018-01-06T01:09:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 116505944,
|
||||
"name": "spectreScope",
|
||||
|
|
|
@ -119,36 +119,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
{
|
||||
"id": 116449314,
|
||||
"name": "Am-I-affected-by-Meltdown",
|
||||
"full_name": "speecyy\/Am-I-affected-by-Meltdown",
|
||||
"owner": {
|
||||
"login": "speecyy",
|
||||
"id": 35145287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4",
|
||||
"html_url": "https:\/\/github.com\/speecyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
|
||||
"description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T03:16:33Z",
|
||||
"updated_at": "2020-02-27T19:31:43Z",
|
||||
"pushed_at": "2018-01-06T03:17:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 118008705,
|
||||
"name": "Meltdown",
|
||||
|
|
|
@ -394,36 +394,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 201442014,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "ThanHuuTuan\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "ThanHuuTuan",
|
||||
"id": 32167814,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T10:01:50Z",
|
||||
"updated_at": "2019-08-09T10:01:53Z",
|
||||
"pushed_at": "2017-04-04T17:20:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 386542444,
|
||||
"name": "CVE-2017-7269",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 116008243,
|
||||
"name": "AntiWeb_testing-Suite",
|
||||
"full_name": "MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"owner": {
|
||||
"login": "MDudek-ICS",
|
||||
"id": 31083304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4",
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T11:28:40Z",
|
||||
"updated_at": "2023-09-28T10:47:07Z",
|
||||
"pushed_at": "2017-11-21T20:19:08Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-8440 standalone exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-31T17:00:43Z",
|
||||
"updated_at": "2023-09-28T10:55:20Z",
|
||||
"updated_at": "2023-10-19T06:40:46Z",
|
||||
"pushed_at": "2018-10-31T19:05:17Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"forks": 49,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"has_discussions": false,
|
||||
"forks_count": 156,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 156,
|
||||
"forks": 157,
|
||||
"watchers": 404,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -599,7 +599,7 @@
|
|||
"description": "CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall\/ChainOfFools)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T18:26:48Z",
|
||||
"updated_at": "2023-09-28T11:10:26Z",
|
||||
"updated_at": "2023-10-19T12:00:03Z",
|
||||
"pushed_at": "2023-05-30T20:05:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -108,10 +108,10 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2023-10-18T08:40:06Z",
|
||||
"updated_at": "2023-10-19T07:38:26Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 530,
|
||||
"watchers_count": 530,
|
||||
"stargazers_count": 531,
|
||||
"watchers_count": 531,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 530,
|
||||
"watchers": 531,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -172,10 +172,10 @@
|
|||
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2023-09-28T11:29:09Z",
|
||||
"updated_at": "2023-10-19T10:27:30Z",
|
||||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -193,7 +193,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 333,
|
||||
"watchers": 334,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2023-09-28T11:27:05Z",
|
||||
"updated_at": "2023-10-19T10:06:25Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit to SYSTEM for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:23:38Z",
|
||||
"updated_at": "2023-09-28T11:27:38Z",
|
||||
"updated_at": "2023-10-19T07:42:54Z",
|
||||
"pushed_at": "2021-05-20T20:33:09Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 238,
|
||||
"watchers": 239,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-10-17T07:16:46Z",
|
||||
"updated_at": "2023-10-19T08:31:00Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1121,
|
||||
"watchers_count": 1121,
|
||||
"stargazers_count": 1122,
|
||||
"watchers_count": 1122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 1121,
|
||||
"watchers": 1122,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 707080239,
|
||||
"name": "CVE-2021-25741",
|
||||
"full_name": "cdxiaodong\/CVE-2021-25741",
|
||||
"owner": {
|
||||
"login": "cdxiaodong",
|
||||
"id": 84082748,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84082748?v=4",
|
||||
"html_url": "https:\/\/github.com\/cdxiaodong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cdxiaodong\/CVE-2021-25741",
|
||||
"description": "fork on Betep0k\/CVE-2021-25741\/fork whose images is useless and test on metarget",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-19T07:26:11Z",
|
||||
"updated_at": "2023-10-19T07:31:06Z",
|
||||
"pushed_at": "2023-10-19T07:35:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -48,7 +48,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-20T22:19:55Z",
|
||||
"updated_at": "2023-09-20T22:25:16Z",
|
||||
"pushed_at": "2023-09-20T22:26:08Z",
|
||||
"pushed_at": "2023-10-19T09:55:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2023-10-18T20:28:39Z",
|
||||
"updated_at": "2023-10-19T08:28:33Z",
|
||||
"pushed_at": "2021-11-11T17:09:56Z",
|
||||
"stargazers_count": 452,
|
||||
"watchers_count": 452,
|
||||
"stargazers_count": 454,
|
||||
"watchers_count": 454,
|
||||
"has_discussions": false,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 452,
|
||||
"watchers": 454,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -385,7 +385,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-24T16:34:13Z",
|
||||
"updated_at": "2023-09-13T09:44:36Z",
|
||||
"pushed_at": "2023-04-24T20:43:45Z",
|
||||
"pushed_at": "2023-10-19T10:55:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2023-10-18T17:56:01Z",
|
||||
"updated_at": "2023-10-19T08:03:06Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 932,
|
||||
"watchers_count": 932,
|
||||
"stargazers_count": 933,
|
||||
"watchers_count": 933,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 932,
|
||||
"watchers": 933,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-10-18T10:50:52Z",
|
||||
"updated_at": "2023-10-19T07:59:41Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1262,
|
||||
"watchers_count": 1262,
|
||||
"stargazers_count": 1263,
|
||||
"watchers_count": 1263,
|
||||
"has_discussions": false,
|
||||
"forks_count": 318,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 318,
|
||||
"watchers": 1262,
|
||||
"watchers": 1263,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 509461641,
|
||||
"name": "external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T13:16:14Z",
|
||||
"updated_at": "2022-07-01T13:25:04Z",
|
||||
"pushed_at": "2022-07-01T13:25:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2023-10-17T15:49:16Z",
|
||||
"updated_at": "2023-10-19T09:12:09Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 194,
|
||||
"watchers": 195,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-10-12T16:36:57Z",
|
||||
"updated_at": "2023-10-19T06:52:53Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 733,
|
||||
"watchers_count": 733,
|
||||
"stargazers_count": 734,
|
||||
"watchers_count": 734,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 733,
|
||||
"watchers": 734,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -692,66 +692,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 524471767,
|
||||
"name": "CVE-2022-22954",
|
||||
"full_name": "amit-pathak009\/CVE-2022-22954",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:00:04Z",
|
||||
"updated_at": "2022-06-02T01:44:19Z",
|
||||
"pushed_at": "2022-06-02T01:44:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 524471940,
|
||||
"name": "CVE-2022-22954-PoC",
|
||||
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:00:39Z",
|
||||
"updated_at": "2022-06-01T22:41:09Z",
|
||||
"pushed_at": "2022-06-01T22:41:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 545257457,
|
||||
"name": "VcenterKiller",
|
||||
|
@ -766,10 +706,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-10-17T07:16:46Z",
|
||||
"updated_at": "2023-10-19T08:31:00Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1121,
|
||||
"watchers_count": 1121,
|
||||
"stargazers_count": 1122,
|
||||
"watchers_count": 1122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +725,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 1121,
|
||||
"watchers": 1122,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -87,10 +87,10 @@
|
|||
"description": "Spring4Shell - Spring Core RCE - CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T17:05:46Z",
|
||||
"updated_at": "2023-09-28T11:37:32Z",
|
||||
"updated_at": "2023-10-19T10:34:13Z",
|
||||
"pushed_at": "2022-04-04T14:09:11Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -110,7 +110,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -572,66 +572,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 524474931,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "amit-pathak009\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:14:43Z",
|
||||
"updated_at": "2022-05-19T21:24:13Z",
|
||||
"pushed_at": "2022-05-19T21:24:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 524475053,
|
||||
"name": "CVE-2022-29464-mass",
|
||||
"full_name": "amit-pathak009\/CVE-2022-29464-mass",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:15:18Z",
|
||||
"updated_at": "2023-09-28T11:41:52Z",
|
||||
"pushed_at": "2022-05-29T19:16:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 540011346,
|
||||
"name": "CVE-2022-29464",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-10-15T04:21:40Z",
|
||||
"updated_at": "2023-10-19T09:54:53Z",
|
||||
"pushed_at": "2023-10-14T08:02:40Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-02T15:34:28Z",
|
||||
"updated_at": "2023-10-10T12:02:36Z",
|
||||
"updated_at": "2023-10-19T08:38:17Z",
|
||||
"pushed_at": "2023-02-02T16:53:37Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 261,
|
||||
"watchers": 262,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1,40 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 693902562,
|
||||
"name": "CVE-2023-0255-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-0255-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-0255-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-0255 < WordPress < Enable Media+Plugin < Unauthenticated Arbitrary File Upload \/ Webshell Upload",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-20T00:17:57Z",
|
||||
"updated_at": "2023-10-09T21:27:28Z",
|
||||
"pushed_at": "2023-09-25T17:08:11Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-0225-exp",
|
||||
"cve-2023-0225-exploit",
|
||||
"cve-2023-0225-poc",
|
||||
"exploit",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-0386在ubuntu22.04上的提权",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T03:02:13Z",
|
||||
"updated_at": "2023-10-18T16:38:16Z",
|
||||
"updated_at": "2023-10-19T07:57:05Z",
|
||||
"pushed_at": "2023-06-13T08:58:53Z",
|
||||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"stargazers_count": 363,
|
||||
"watchers_count": 363,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 362,
|
||||
"watchers": 363,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -28,49 +28,5 @@
|
|||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 673139589,
|
||||
"name": "CVE-2023-1112-EXP",
|
||||
"full_name": "codeb0ss\/CVE-2023-1112-EXP",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-1112-EXP",
|
||||
"description": "CVE-2023-1112 Auto Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-01T01:02:12Z",
|
||||
"updated_at": "2023-10-09T21:34:00Z",
|
||||
"pushed_at": "2023-08-01T01:09:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023",
|
||||
"cve-2023-1112",
|
||||
"cve-2023-1112-exp",
|
||||
"cve-2023-1112-exploiter",
|
||||
"cve-2023-1112-wp",
|
||||
"exploit",
|
||||
"uncodeboss",
|
||||
"wordpress",
|
||||
"wordpress0day",
|
||||
"wordpressexploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 690304009,
|
||||
"name": "CVE-2023-1273-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-1273-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-1273-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-1273 \/ ND Shortcodes < LFI",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-12T00:10:58Z",
|
||||
"updated_at": "2023-10-09T21:29:10Z",
|
||||
"pushed_at": "2023-09-12T00:15:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,45 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 689493802,
|
||||
"name": "CVE-2023-1698-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-1698-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-1698-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-1698 < Unauthenticated Remote Command Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-10T01:29:48Z",
|
||||
"updated_at": "2023-10-09T21:30:00Z",
|
||||
"pushed_at": "2023-09-10T01:36:35Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023-1698",
|
||||
"cve-2023-1698-exp",
|
||||
"cve-2023-1698-exploit",
|
||||
"cve-2023-1698-poc",
|
||||
"cve-2023-1698-rce",
|
||||
"hackerone",
|
||||
"rce",
|
||||
"rce-exploit",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,50 +28,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 680672954,
|
||||
"name": "CVE-2023-20073-",
|
||||
"full_name": "codeb0ss\/CVE-2023-20073-",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-20073-",
|
||||
"description": "Mass Exploit - CVE-2023-20073 - Cisco VPN Routers - [Unauthenticated Arbitrary File Upload and Stored XSS]",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-20T02:45:50Z",
|
||||
"updated_at": "2023-10-09T21:32:51Z",
|
||||
"pushed_at": "2023-08-20T02:53:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"bug",
|
||||
"bugbounty",
|
||||
"cisco",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023-20073",
|
||||
"exploit",
|
||||
"hackerone",
|
||||
"mass",
|
||||
"mass-exploit",
|
||||
"uncodeboss",
|
||||
"vpn-router"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T12:22:57Z",
|
||||
"updated_at": "2023-10-03T17:56:37Z",
|
||||
"updated_at": "2023-10-19T12:57:32Z",
|
||||
"pushed_at": "2023-06-18T12:41:52Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "CVE-2023-20198 Checkscript",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T08:00:18Z",
|
||||
"updated_at": "2023-10-19T06:18:22Z",
|
||||
"updated_at": "2023-10-19T11:16:58Z",
|
||||
"pushed_at": "2023-10-17T11:28:05Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "cisco-CVE-2023-20198-tester ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T15:44:01Z",
|
||||
"updated_at": "2023-10-17T15:51:02Z",
|
||||
"updated_at": "2023-10-19T10:01:05Z",
|
||||
"pushed_at": "2023-10-17T15:50:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2023-20198 & 0Day Implant Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T22:41:14Z",
|
||||
"updated_at": "2023-10-19T01:23:49Z",
|
||||
"updated_at": "2023-10-19T12:12:02Z",
|
||||
"pushed_at": "2023-10-17T23:10:02Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -258,13 +258,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
@ -332,35 +332,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 706827261,
|
||||
"name": "CVE-2023-20198",
|
||||
"full_name": "exp166\/CVE-2023-20198",
|
||||
"owner": {
|
||||
"login": "exp166",
|
||||
"id": 148376716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148376716?v=4",
|
||||
"html_url": "https:\/\/github.com\/exp166"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exp166\/CVE-2023-20198",
|
||||
"description": "Cisco IOS XE exploit CVE-2023-20198 ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-18T17:36:04Z",
|
||||
"updated_at": "2023-10-18T17:36:04Z",
|
||||
"pushed_at": "2023-10-18T17:38:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-2023",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T12:57:22Z",
|
||||
"updated_at": "2023-10-19T03:03:38Z",
|
||||
"updated_at": "2023-10-19T08:43:31Z",
|
||||
"pushed_at": "2023-10-15T12:09:05Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"has_discussions": false,
|
||||
"forks_count": 189,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 189,
|
||||
"watchers": 493,
|
||||
"forks": 190,
|
||||
"watchers": 494,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-21971 Connector\/J RCE Analysis分析",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T03:05:54Z",
|
||||
"updated_at": "2023-07-26T07:52:50Z",
|
||||
"updated_at": "2023-10-19T08:06:25Z",
|
||||
"pushed_at": "2023-06-08T03:06:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T21:40:09Z",
|
||||
"updated_at": "2023-10-19T04:12:45Z",
|
||||
"updated_at": "2023-10-19T09:43:25Z",
|
||||
"pushed_at": "2023-10-17T22:04:13Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -112,10 +112,10 @@
|
|||
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T08:42:17Z",
|
||||
"updated_at": "2023-10-18T08:42:44Z",
|
||||
"updated_at": "2023-10-19T08:23:47Z",
|
||||
"pushed_at": "2023-10-16T02:24:02Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -124,7 +124,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1,40 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 673576455,
|
||||
"name": "CVE-2023-2333-EXP",
|
||||
"full_name": "codeb0ss\/CVE-2023-2333-EXP",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-2333-EXP",
|
||||
"description": "CVE-2023-2333-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-02T00:36:27Z",
|
||||
"updated_at": "2023-08-02T00:40:01Z",
|
||||
"pushed_at": "2023-08-02T00:39:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023",
|
||||
"kurdistan",
|
||||
"uncodeboss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -89,36 +89,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 662853030,
|
||||
"name": "cve-2023-24488",
|
||||
"full_name": "codeb0ss\/cve-2023-24488",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/cve-2023-24488",
|
||||
"description": "CVE-2023-24488 By codeb0ss",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-06T03:07:09Z",
|
||||
"updated_at": "2023-10-09T21:34:33Z",
|
||||
"pushed_at": "2023-07-06T03:07:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 663114176,
|
||||
"name": "CVE-2023-24488-SIEM-Sigma-Rule",
|
||||
|
|
|
@ -29,48 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 670873412,
|
||||
"name": "CVE-2023-24489-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-24489-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-24489-PoC",
|
||||
"description": "CVE-2023-24489 PoC & Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-26T03:19:20Z",
|
||||
"updated_at": "2023-10-09T21:34:16Z",
|
||||
"pushed_at": "2023-07-26T03:24:22Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"citrix-rce",
|
||||
"cve",
|
||||
"cve-2023",
|
||||
"cve-2023-24489",
|
||||
"cve-2023-24489-poc",
|
||||
"cve-2023-24489-rce",
|
||||
"kurdish",
|
||||
"kurdistan",
|
||||
"rce",
|
||||
"remote",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 683690698,
|
||||
"name": "CVE-2023-24489-poc",
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 700120350,
|
||||
"name": "CVE-2023-25573-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-25573-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-25573-PoC",
|
||||
"description": "CVE-2023-25573 - Metersphere < Arbitrary File Read",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T01:33:30Z",
|
||||
"updated_at": "2023-10-04T01:34:47Z",
|
||||
"pushed_at": "2023-10-04T01:36:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,47 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 687302632,
|
||||
"name": "CVE-2023-27034-Exploit",
|
||||
"full_name": "codeb0ss\/CVE-2023-27034-Exploit",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-27034-Exploit",
|
||||
"description": "Mass Exploit - CVE-2023-27034",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-05T04:43:06Z",
|
||||
"updated_at": "2023-10-09T21:30:30Z",
|
||||
"pushed_at": "2023-09-05T04:45:32Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"2023-poc",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"codeboss-team",
|
||||
"cve",
|
||||
"cve-2023",
|
||||
"cve-2023-27034",
|
||||
"cve-2023-27034-exp",
|
||||
"cve-2023-27034-exploit",
|
||||
"cve-2023-27034-poc",
|
||||
"cve-poc",
|
||||
"cves",
|
||||
"hackerone",
|
||||
"prestashop"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T11:14:08Z",
|
||||
"updated_at": "2023-08-30T07:41:48Z",
|
||||
"updated_at": "2023-10-19T06:48:36Z",
|
||||
"pushed_at": "2023-06-18T11:51:54Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-33733 reportlab RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T22:22:50Z",
|
||||
"updated_at": "2023-10-19T03:21:13Z",
|
||||
"updated_at": "2023-10-19T09:20:23Z",
|
||||
"pushed_at": "2023-09-05T15:49:14Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 70,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -28,47 +28,5 @@
|
|||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 700114927,
|
||||
"name": "CVE-2023-33831-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-33831-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-33831-PoC",
|
||||
"description": "CVE-2023-33831 - FUXA < Unauthenticated Remote Code Execution [RCE]",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T01:12:10Z",
|
||||
"updated_at": "2023-10-09T21:27:48Z",
|
||||
"pushed_at": "2023-10-04T01:15:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-33831",
|
||||
"cve-2023-33831-exp",
|
||||
"cve-2023-33831-exploit",
|
||||
"cve-2023-33831-poc",
|
||||
"cve-2023-33831-website",
|
||||
"exploiter",
|
||||
"fuxa",
|
||||
"fuxa-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,49 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 687300976,
|
||||
"name": "CVE-2023-34747-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-34747-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-34747-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-34747 - Ujcms - Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-05T04:36:42Z",
|
||||
"updated_at": "2023-10-09T21:30:40Z",
|
||||
"pushed_at": "2023-09-05T04:39:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"arbitrary-file-upload",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023",
|
||||
"cve-2023-34747",
|
||||
"cve-2023-34747-exp",
|
||||
"cve-2023-34747-exploit",
|
||||
"cve-2023-34747-exploiter",
|
||||
"cve-2023-34747-poc",
|
||||
"cve-pocs",
|
||||
"hackerone",
|
||||
"pocs",
|
||||
"ujcms",
|
||||
"ujcms-exploit",
|
||||
"uncodeboss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2023-10-18T02:30:38Z",
|
||||
"updated_at": "2023-10-19T09:54:52Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -88,47 +88,5 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 679508296,
|
||||
"name": "CVE-2023-37979",
|
||||
"full_name": "codeb0ss\/CVE-2023-37979",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-37979",
|
||||
"description": "CVE-2023-37979 - WordPress Authenticated XSS in Ninja-forms Plugin + Upload File",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-17T02:24:42Z",
|
||||
"updated_at": "2023-10-09T21:33:44Z",
|
||||
"pushed_at": "2023-08-17T02:29:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-37979",
|
||||
"cve-2023-37979-exploit",
|
||||
"hackerone",
|
||||
"uncodeboss",
|
||||
"wordpress",
|
||||
"wordpress-development",
|
||||
"wordpress-exploit",
|
||||
"wordpress-plugin"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,43 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 701909425,
|
||||
"name": "CVE-2023-37988-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-37988-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-37988-PoC",
|
||||
"description": "CVE-2023-37988 - Wordpress\/Plugin - Contact Form Generator < Reflected Cross-Site Scripting [RXSS]",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-07T23:40:53Z",
|
||||
"updated_at": "2023-10-13T13:08:35Z",
|
||||
"pushed_at": "2023-10-07T23:42:47Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-37988",
|
||||
"cve-2023-37988-exp",
|
||||
"cve-2023-37988-exploit",
|
||||
"cve-2023-37988-poc",
|
||||
"cve-2023-37988-wp",
|
||||
"wordpress",
|
||||
"wordpress-cve-2023-37988",
|
||||
"wp-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-13T04:00:14Z",
|
||||
"updated_at": "2023-10-15T10:55:26Z",
|
||||
"updated_at": "2023-10-19T10:44:18Z",
|
||||
"pushed_at": "2023-09-13T04:50:29Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 149,
|
||||
"forks": 33,
|
||||
"watchers": 150,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1,46 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 680677641,
|
||||
"name": "CVE-2023-3836",
|
||||
"full_name": "codeb0ss\/CVE-2023-3836",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-3836",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-20T03:16:31Z",
|
||||
"updated_at": "2023-10-09T21:32:28Z",
|
||||
"pushed_at": "2023-08-20T03:20:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"bugbounty",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023-3836",
|
||||
"exploit",
|
||||
"exploiter",
|
||||
"hackerone",
|
||||
"uncodeboss",
|
||||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 685050566,
|
||||
"name": "CVE-2023-3836",
|
||||
|
|
|
@ -1,41 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 683297673,
|
||||
"name": "CVE-2023-38388",
|
||||
"full_name": "codeb0ss\/CVE-2023-38388",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-38388",
|
||||
"description": "Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-26T05:51:06Z",
|
||||
"updated_at": "2023-10-03T11:44:47Z",
|
||||
"pushed_at": "2023-08-27T00:41:52Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-38388",
|
||||
"cve-2023-38388-exploit",
|
||||
"cve-2023-38388-poc",
|
||||
"kurdish",
|
||||
"kurdish-hacker",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,41 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 683556466,
|
||||
"name": "CVE-2023-38389-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-38389-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-38389-PoC",
|
||||
"description": "CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T00:30:16Z",
|
||||
"updated_at": "2023-10-09T21:32:03Z",
|
||||
"pushed_at": "2023-08-27T00:41:40Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"cve-2023-38389",
|
||||
"cve-2023-38389-exp",
|
||||
"cve-2023-38389-exploit",
|
||||
"cve-2023-38389-poc",
|
||||
"uncodeboss",
|
||||
"wordpress",
|
||||
"wordpress-exploiut"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,39 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 701146595,
|
||||
"name": "CVE-2023-38501-Exploit",
|
||||
"full_name": "codeb0ss\/CVE-2023-38501-Exploit",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-38501-Exploit",
|
||||
"description": "Mass exploit - CVE-2023-38501 - Copyparty < Cross-Site Scripting [XSS]",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-06T02:55:05Z",
|
||||
"updated_at": "2023-10-09T21:26:31Z",
|
||||
"pushed_at": "2023-10-06T02:57:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-38501",
|
||||
"cve-2023-38501-exp",
|
||||
"cve-2023-38501-exploit",
|
||||
"cve-2023-38501-poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -193,19 +193,19 @@
|
|||
"description": "socks5 heap buffer overflow",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T09:03:15Z",
|
||||
"updated_at": "2023-10-18T18:14:25Z",
|
||||
"updated_at": "2023-10-19T10:02:27Z",
|
||||
"pushed_at": "2023-10-17T09:04:55Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -528,10 +528,10 @@
|
|||
"description": "CVE-2023-38646 Metabase RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T03:18:09Z",
|
||||
"updated_at": "2023-10-19T03:58:33Z",
|
||||
"updated_at": "2023-10-19T09:51:06Z",
|
||||
"pushed_at": "2023-10-11T04:06:43Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -545,7 +545,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -713,10 +713,10 @@
|
|||
"description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T01:29:37Z",
|
||||
"updated_at": "2023-10-17T05:09:32Z",
|
||||
"updated_at": "2023-10-19T12:15:55Z",
|
||||
"pushed_at": "2023-10-15T01:51:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -725,7 +725,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-10-19T06:15:11Z",
|
||||
"updated_at": "2023-10-19T12:11:18Z",
|
||||
"pushed_at": "2023-09-17T02:17:52Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 682,
|
||||
"watchers": 683,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -1,46 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 684867044,
|
||||
"name": "CVE-2023-39141-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-39141-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-39141-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-39141 < Aria2 WebUI < Path traversal",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T02:35:14Z",
|
||||
"updated_at": "2023-08-30T02:40:05Z",
|
||||
"pushed_at": "2023-08-30T02:38:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-39141",
|
||||
"cve-2023-39141-exp",
|
||||
"cve-2023-39141-exploit",
|
||||
"cve-2023-39141-poc",
|
||||
"exploiter",
|
||||
"hackerone",
|
||||
"krd",
|
||||
"mass-cve-2023-39141",
|
||||
"mass-cve-2023-39141-exploit",
|
||||
"mass-cve-2023-39141-poc",
|
||||
"mass-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,41 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 679516211,
|
||||
"name": "CVE-2023-39143",
|
||||
"full_name": "codeb0ss\/CVE-2023-39143",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-39143",
|
||||
"description": "CVE-2023-39143 < PaperCut < Path Traversal (PT)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-17T02:57:48Z",
|
||||
"updated_at": "2023-08-17T02:59:36Z",
|
||||
"pushed_at": "2023-08-17T03:00:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023-39143",
|
||||
"exploiter",
|
||||
"hackerone",
|
||||
"papercut"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,47 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 687298456,
|
||||
"name": "CVE-2023-41538-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-41538-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-41538-PoC",
|
||||
"description": "Mass exploit - CVE-2023-41538 < phpjabbers PHP Forum < Cross Site Scripting (XSS)",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-05T04:26:52Z",
|
||||
"updated_at": "2023-10-09T21:31:01Z",
|
||||
"pushed_at": "2023-09-05T04:32:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023",
|
||||
"cve-2023-41538",
|
||||
"cve-2023-41538-exp",
|
||||
"cve-2023-41538-exploit",
|
||||
"cve-2023-41538-poc",
|
||||
"cve-poc",
|
||||
"phpforum",
|
||||
"phpjabber",
|
||||
"phpjabbers",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-16T05:08:06Z",
|
||||
"updated_at": "2023-10-19T06:00:34Z",
|
||||
"updated_at": "2023-10-19T10:39:42Z",
|
||||
"pushed_at": "2023-10-18T12:27:17Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -28,43 +28,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 679513184,
|
||||
"name": "CVE-2023-4174",
|
||||
"full_name": "codeb0ss\/CVE-2023-4174",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-4174",
|
||||
"description": "CVE-2023-4174 - mooSocial 3.1.6 - Reflected Cross Site Scripting (XSS)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-17T02:44:49Z",
|
||||
"updated_at": "2023-10-09T21:33:15Z",
|
||||
"pushed_at": "2023-08-17T02:47:31Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-4174",
|
||||
"cve-2023-4174-exp",
|
||||
"exploiter",
|
||||
"uncodeboss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2023-10-19T06:06:36Z",
|
||||
"updated_at": "2023-10-19T13:03:22Z",
|
||||
"pushed_at": "2023-10-19T05:45:16Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 114,
|
||||
"watchers": 121,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -1,43 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 690299358,
|
||||
"name": "CVE-2023-4238-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-4238-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-4238-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-4238 \/ Wordpress Prevent files\/Access Plugin Upload_Webshell.php",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-11T23:53:11Z",
|
||||
"updated_at": "2023-10-09T21:29:47Z",
|
||||
"pushed_at": "2023-09-12T00:04:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023",
|
||||
"cve-2023-4238",
|
||||
"cve-2023-4238-exp",
|
||||
"cve-2023-4238-poc",
|
||||
"exploit-shell",
|
||||
"wordpress",
|
||||
"wordpress-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T09:35:07Z",
|
||||
"updated_at": "2023-10-19T06:33:47Z",
|
||||
"updated_at": "2023-10-19T12:22:32Z",
|
||||
"pushed_at": "2023-10-15T01:28:07Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 56,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1,41 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 706978920,
|
||||
"name": "CVE-2023-44227-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-44227-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-44227-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-19T01:33:08Z",
|
||||
"updated_at": "2023-10-19T01:37:25Z",
|
||||
"pushed_at": "2023-10-19T01:36:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023-44227",
|
||||
"cve-2023-44227-exp",
|
||||
"cve-2023-44227-exploit",
|
||||
"cve-2023-44227-poc",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T14:20:42Z",
|
||||
"updated_at": "2023-10-19T02:49:56Z",
|
||||
"updated_at": "2023-10-19T07:07:31Z",
|
||||
"pushed_at": "2023-10-14T16:43:31Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -141,10 +141,10 @@
|
|||
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-13T23:55:32Z",
|
||||
"updated_at": "2023-10-18T09:41:58Z",
|
||||
"updated_at": "2023-10-19T12:16:47Z",
|
||||
"pushed_at": "2023-10-16T23:36:45Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -153,7 +153,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,43 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 705092876,
|
||||
"name": "CVE-2023-45603-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-45603-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-45603-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-45603 - Wordpress\/plugin\/user-submitted-posts < Unauthenticated Arbitrary File Upload\/Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T01:57:25Z",
|
||||
"updated_at": "2023-10-17T21:03:21Z",
|
||||
"pushed_at": "2023-10-15T02:16:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve-2023-45603",
|
||||
"cve-2023-45603-exp",
|
||||
"cve-2023-45603-exploit",
|
||||
"cve-2023-45603-poc",
|
||||
"cve-2023-45603-wp",
|
||||
"kurd",
|
||||
"wordpress",
|
||||
"wordpress-plugin"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-10-18T12:19:34Z",
|
||||
"updated_at": "2023-10-18T19:25:42Z",
|
||||
"pushed_at": "2023-10-18T19:25:38Z",
|
||||
"pushed_at": "2023-10-19T07:11:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1,20 +1,20 @@
|
|||
[
|
||||
{
|
||||
"id": 116205741,
|
||||
"name": "CVE-2017-17692",
|
||||
"full_name": "specloli\/CVE-2017-17692",
|
||||
"id": 707100656,
|
||||
"name": "CVE-2023-46003",
|
||||
"full_name": "leekenghwa\/CVE-2023-46003",
|
||||
"owner": {
|
||||
"login": "specloli",
|
||||
"id": 10647366,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
|
||||
"html_url": "https:\/\/github.com\/specloli"
|
||||
"login": "leekenghwa",
|
||||
"id": 45155253,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45155253?v=4",
|
||||
"html_url": "https:\/\/github.com\/leekenghwa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
|
||||
"html_url": "https:\/\/github.com\/leekenghwa\/CVE-2023-46003",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T02:40:13Z",
|
||||
"updated_at": "2021-11-23T15:08:43Z",
|
||||
"pushed_at": "2018-01-02T13:58:02Z",
|
||||
"created_at": "2023-10-19T08:17:53Z",
|
||||
"updated_at": "2023-10-19T08:17:54Z",
|
||||
"pushed_at": "2023-10-19T09:02:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-4911 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:32:49Z",
|
||||
"updated_at": "2023-10-17T23:55:04Z",
|
||||
"updated_at": "2023-10-19T06:44:59Z",
|
||||
"pushed_at": "2023-10-08T23:24:24Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -163,10 +163,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T22:04:23Z",
|
||||
"updated_at": "2023-10-17T02:47:30Z",
|
||||
"updated_at": "2023-10-19T09:25:38Z",
|
||||
"pushed_at": "2023-10-15T19:37:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 698443120,
|
||||
"name": "CVE-2023-5074-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-5074-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-5074-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-5074 \/ D-Link D-View < Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-30T00:07:52Z",
|
||||
"updated_at": "2023-10-09T21:25:24Z",
|
||||
"pushed_at": "2023-09-30T01:18:35Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1,41 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 706967921,
|
||||
"name": "CVE-2023-5601-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-5601-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-5601-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-19T00:47:06Z",
|
||||
"updated_at": "2023-10-19T01:11:28Z",
|
||||
"pushed_at": "2023-10-19T00:49:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"cve-2023-5601",
|
||||
"cve-2023-5601-exploit",
|
||||
"cve-2023-5601-poc",
|
||||
"cve-2023-5601-wordpress",
|
||||
"exploit",
|
||||
"wordfrence",
|
||||
"wpscan"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
167
README.md
167
README.md
|
@ -52,13 +52,6 @@
|
|||
- [TurtleARM/CVE-2023-0179-PoC](https://github.com/TurtleARM/CVE-2023-0179-PoC)
|
||||
- [H4K6/CVE-2023-0179-PoC](https://github.com/H4K6/CVE-2023-0179-PoC)
|
||||
|
||||
### CVE-2023-0255 (2023-02-13)
|
||||
|
||||
<code>The Enable Media Replace WordPress plugin before 4.0.2 does not prevent authors from uploading arbitrary files to the site, which may allow them to upload PHP shells on affected sites.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-0255-PoC](https://github.com/codeb0ss/CVE-2023-0255-PoC)
|
||||
|
||||
### CVE-2023-0264 (2023-08-04)
|
||||
|
||||
<code>A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
|
||||
|
@ -166,7 +159,6 @@
|
|||
</code>
|
||||
|
||||
- [Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal](https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal)
|
||||
- [codeb0ss/CVE-2023-1112-EXP](https://github.com/codeb0ss/CVE-2023-1112-EXP)
|
||||
|
||||
### CVE-2023-1177 (2023-03-24)
|
||||
|
||||
|
@ -176,13 +168,6 @@
|
|||
- [hh-hunter/ml-CVE-2023-1177](https://github.com/hh-hunter/ml-CVE-2023-1177)
|
||||
- [iumiro/CVE-2023-1177-MLFlow](https://github.com/iumiro/CVE-2023-1177-MLFlow)
|
||||
|
||||
### CVE-2023-1273 (2023-07-04)
|
||||
|
||||
<code>The ND Shortcodes WordPress plugin before 7.0 does not validate some shortcode attributes before using them to generate paths passed to include function/s, allowing any authenticated users such as subscriber to perform LFI attacks
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-1273-PoC](https://github.com/codeb0ss/CVE-2023-1273-PoC)
|
||||
|
||||
### CVE-2023-1337 (2023-03-10)
|
||||
|
||||
<code>The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files.
|
||||
|
@ -240,13 +225,6 @@
|
|||
- [W01fh4cker/CVE-2023-1671-POC](https://github.com/W01fh4cker/CVE-2023-1671-POC)
|
||||
- [csffs/cve-2023-1671](https://github.com/csffs/cve-2023-1671)
|
||||
|
||||
### CVE-2023-1698 (2023-05-15)
|
||||
|
||||
<code>In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-1698-PoC](https://github.com/codeb0ss/CVE-2023-1698-PoC)
|
||||
|
||||
### CVE-2023-1767 (2023-04-20)
|
||||
|
||||
<code>The Snyk Advisor website (https://snyk.io/advisor/) was vulnerable to a stored XSS prior to 28th March 2023. A feature of Snyk Advisor is to display the contents of a scanned package's Readme on its package health page. An attacker could create a package in NPM with an associated markdown README file containing XSS-able HTML tags. Upon Snyk Advisor importing the package, the XSS would run each time an end user browsed to the package's page on Snyk Advisor.
|
||||
|
@ -323,13 +301,6 @@
|
|||
|
||||
- [elweth-sec/CVE-2023-2255](https://github.com/elweth-sec/CVE-2023-2255)
|
||||
|
||||
### CVE-2023-2333 (2023-07-04)
|
||||
|
||||
<code>The Ninja Forms Google Sheet Connector WordPress plugin before 1.2.7, gsheetconnector-ninja-forms-pro WordPress plugin through 1.2.7 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-2333-EXP](https://github.com/codeb0ss/CVE-2023-2333-EXP)
|
||||
|
||||
### CVE-2023-2516 (2023-05-05)
|
||||
|
||||
<code>Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7.
|
||||
|
@ -608,7 +579,6 @@
|
|||
<code>In Dahua Smart Park Management bis 20230713 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /emap/devicePoint_addImgIco?hasSubsystem=true. Durch Manipulation des Arguments upload mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-3836](https://github.com/codeb0ss/CVE-2023-3836)
|
||||
- [zh-byte/CVE-2023-3836](https://github.com/zh-byte/CVE-2023-3836)
|
||||
|
||||
### CVE-2023-4128 (2023-08-10)
|
||||
|
@ -645,14 +615,6 @@
|
|||
</code>
|
||||
|
||||
- [d0rb/CVE-2023-4174](https://github.com/d0rb/CVE-2023-4174)
|
||||
- [codeb0ss/CVE-2023-4174](https://github.com/codeb0ss/CVE-2023-4174)
|
||||
|
||||
### CVE-2023-4238 (2023-09-25)
|
||||
|
||||
<code>The Prevent files / folders access WordPress plugin before 2.5.2 does not validate files to be uploaded, which could allow attackers to upload arbitrary files such as PHP on the server.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-4238-PoC](https://github.com/codeb0ss/CVE-2023-4238-PoC)
|
||||
|
||||
### CVE-2023-4278 (2023-09-11)
|
||||
|
||||
|
@ -793,13 +755,6 @@
|
|||
### CVE-2023-5070
|
||||
- [RandomRobbieBF/CVE-2023-5070](https://github.com/RandomRobbieBF/CVE-2023-5070)
|
||||
|
||||
### CVE-2023-5074 (2023-09-20)
|
||||
|
||||
<code>Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-5074-PoC](https://github.com/codeb0ss/CVE-2023-5074-PoC)
|
||||
|
||||
### CVE-2023-5142 (2023-09-24)
|
||||
|
||||
<code>In H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 bis 20230908 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /userLogin.asp der Komponente Config File Handler. Durch das Beeinflussen mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung.
|
||||
|
@ -846,9 +801,6 @@
|
|||
### CVE-2023-5546
|
||||
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
|
||||
|
||||
### CVE-2023-5601
|
||||
- [codeb0ss/CVE-2023-5601-PoC](https://github.com/codeb0ss/CVE-2023-5601-PoC)
|
||||
|
||||
### CVE-2023-20025 (2023-01-20)
|
||||
|
||||
<code>A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device. This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device.
|
||||
|
@ -870,7 +822,6 @@
|
|||
</code>
|
||||
|
||||
- [RegularITCat/CVE-2023-20073](https://github.com/RegularITCat/CVE-2023-20073)
|
||||
- [codeb0ss/CVE-2023-20073-](https://github.com/codeb0ss/CVE-2023-20073-)
|
||||
|
||||
### CVE-2023-20110 (2023-05-17)
|
||||
|
||||
|
@ -909,7 +860,6 @@
|
|||
- [Tounsi007/CVE-2023-20198](https://github.com/Tounsi007/CVE-2023-20198)
|
||||
- [alekos3/CVE_2023_20198_Detector](https://github.com/alekos3/CVE_2023_20198_Detector)
|
||||
- [ditekshen/ansible-cve-2023-20198](https://github.com/ditekshen/ansible-cve-2023-20198)
|
||||
- [exp166/CVE-2023-20198](https://github.com/exp166/CVE-2023-20198)
|
||||
|
||||
### CVE-2023-20209 (2023-08-16)
|
||||
|
||||
|
@ -1495,7 +1445,6 @@
|
|||
- [SirBugs/CVE-2023-24488-PoC](https://github.com/SirBugs/CVE-2023-24488-PoC)
|
||||
- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
|
||||
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
|
||||
- [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488)
|
||||
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
|
||||
- [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
|
||||
|
||||
|
@ -1505,7 +1454,6 @@
|
|||
</code>
|
||||
|
||||
- [adhikara13/CVE-2023-24489-ShareFile](https://github.com/adhikara13/CVE-2023-24489-ShareFile)
|
||||
- [codeb0ss/CVE-2023-24489-PoC](https://github.com/codeb0ss/CVE-2023-24489-PoC)
|
||||
- [whalebone7/CVE-2023-24489-poc](https://github.com/whalebone7/CVE-2023-24489-poc)
|
||||
|
||||
### CVE-2023-24517 (2023-08-22)
|
||||
|
@ -1631,13 +1579,6 @@
|
|||
- [brainkok/CVE-2023-25292](https://github.com/brainkok/CVE-2023-25292)
|
||||
- [tucommenceapousser/CVE-2023-25292](https://github.com/tucommenceapousser/CVE-2023-25292)
|
||||
|
||||
### CVE-2023-25573 (2023-03-09)
|
||||
|
||||
<code>metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-25573-PoC](https://github.com/codeb0ss/CVE-2023-25573-PoC)
|
||||
|
||||
### CVE-2023-25610
|
||||
- [qi4L/CVE-2023-25610](https://github.com/qi4L/CVE-2023-25610)
|
||||
|
||||
|
@ -1773,13 +1714,6 @@
|
|||
|
||||
- [bypazs/CVE-2023-26984](https://github.com/bypazs/CVE-2023-26984)
|
||||
|
||||
### CVE-2023-27034 (2023-03-23)
|
||||
|
||||
<code>PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-27034-Exploit](https://github.com/codeb0ss/CVE-2023-27034-Exploit)
|
||||
|
||||
### CVE-2023-27035 (2023-05-01)
|
||||
|
||||
<code>An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page.
|
||||
|
@ -2954,7 +2888,6 @@
|
|||
</code>
|
||||
|
||||
- [rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831](https://github.com/rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831)
|
||||
- [codeb0ss/CVE-2023-33831-PoC](https://github.com/codeb0ss/CVE-2023-33831-PoC)
|
||||
|
||||
### CVE-2023-33977 (2023-06-06)
|
||||
|
||||
|
@ -3063,13 +2996,6 @@
|
|||
|
||||
- [radman404/CVE-2023-34634](https://github.com/radman404/CVE-2023-34634)
|
||||
|
||||
### CVE-2023-34747 (2023-06-14)
|
||||
|
||||
<code>File upload vulnerability in ujcms 6.0.2 via /api/backend/core/web-file-upload/upload.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-34747-PoC](https://github.com/codeb0ss/CVE-2023-34747-PoC)
|
||||
|
||||
### CVE-2023-34761 (2023-06-28)
|
||||
|
||||
<code>An unauthenticated attacker within BLE proximity can remotely connect to a 7-Eleven LED Message Cup, Hello Cup 1.3.1 for Android, and bypass the application's client-side chat censor filter.
|
||||
|
@ -3629,14 +3555,6 @@
|
|||
- [Fire-Null/CVE-2023-37979](https://github.com/Fire-Null/CVE-2023-37979)
|
||||
- [Mehran-Seifalinia/CVE-2023-37979](https://github.com/Mehran-Seifalinia/CVE-2023-37979)
|
||||
- [d0rb/CVE-2023-37979](https://github.com/d0rb/CVE-2023-37979)
|
||||
- [codeb0ss/CVE-2023-37979](https://github.com/codeb0ss/CVE-2023-37979)
|
||||
|
||||
### CVE-2023-37988 (2023-08-10)
|
||||
|
||||
<code>Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Creative Solutions Contact Form Generator plugin <= 2.5.5 versions.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-37988-PoC](https://github.com/codeb0ss/CVE-2023-37988-PoC)
|
||||
|
||||
### CVE-2023-38035 (2023-08-21)
|
||||
|
||||
|
@ -3658,12 +3576,6 @@
|
|||
- [gabe-k/themebleed](https://github.com/gabe-k/themebleed)
|
||||
- [Jnnshschl/CVE-2023-38146](https://github.com/Jnnshschl/CVE-2023-38146)
|
||||
|
||||
### CVE-2023-38388
|
||||
- [codeb0ss/CVE-2023-38388](https://github.com/codeb0ss/CVE-2023-38388)
|
||||
|
||||
### CVE-2023-38389
|
||||
- [codeb0ss/CVE-2023-38389-PoC](https://github.com/codeb0ss/CVE-2023-38389-PoC)
|
||||
|
||||
### CVE-2023-38408 (2023-07-19)
|
||||
|
||||
<code>The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
|
||||
|
@ -3693,13 +3605,6 @@
|
|||
|
||||
- [lucas-cauhe/cargo-perm](https://github.com/lucas-cauhe/cargo-perm)
|
||||
|
||||
### CVE-2023-38501 (2023-07-25)
|
||||
|
||||
<code>copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-38501-Exploit](https://github.com/codeb0ss/CVE-2023-38501-Exploit)
|
||||
|
||||
### CVE-2023-38545 (2023-10-17)
|
||||
|
||||
<code>This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means "let the host resolve the name" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n
|
||||
|
@ -3865,20 +3770,6 @@
|
|||
|
||||
- [Raj789-sec/CVE-2023-39115](https://github.com/Raj789-sec/CVE-2023-39115)
|
||||
|
||||
### CVE-2023-39141 (2023-08-22)
|
||||
|
||||
<code>webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-39141-PoC](https://github.com/codeb0ss/CVE-2023-39141-PoC)
|
||||
|
||||
### CVE-2023-39143 (2023-08-04)
|
||||
|
||||
<code>PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration).
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-39143](https://github.com/codeb0ss/CVE-2023-39143)
|
||||
|
||||
### CVE-2023-39144 (2023-08-02)
|
||||
|
||||
<code>Element55 KnowMore appliances version 21 and older was discovered to store passwords in plaintext.
|
||||
|
@ -4090,13 +3981,6 @@
|
|||
### CVE-2023-41535
|
||||
- [Sh33talUmath/CVE-2023-41535](https://github.com/Sh33talUmath/CVE-2023-41535)
|
||||
|
||||
### CVE-2023-41538 (2023-08-30)
|
||||
|
||||
<code>phpjabbers PHP Forum Script 3.0 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter.
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-41538-PoC](https://github.com/codeb0ss/CVE-2023-41538-PoC)
|
||||
|
||||
### CVE-2023-41575 (2023-09-08)
|
||||
|
||||
<code>Multiple stored cross-site scripting (XSS) vulnerabilities in /bbdms/sign-up.php of Blood Bank & Donor Management v2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name, Message, or Address parameters.
|
||||
|
@ -4464,9 +4348,6 @@
|
|||
|
||||
- [soundarkutty/CVE-2023-44061](https://github.com/soundarkutty/CVE-2023-44061)
|
||||
|
||||
### CVE-2023-44227
|
||||
- [codeb0ss/CVE-2023-44227-PoC](https://github.com/codeb0ss/CVE-2023-44227-PoC)
|
||||
|
||||
### CVE-2023-44487 (2023-10-10)
|
||||
|
||||
<code>The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
|
||||
|
@ -4603,9 +4484,6 @@
|
|||
|
||||
- [ahrixia/CVE-2023-45542](https://github.com/ahrixia/CVE-2023-45542)
|
||||
|
||||
### CVE-2023-45603
|
||||
- [codeb0ss/CVE-2023-45603-PoC](https://github.com/codeb0ss/CVE-2023-45603-PoC)
|
||||
|
||||
### CVE-2023-45828
|
||||
- [RandomRobbieBF/CVE-2023-45828](https://github.com/RandomRobbieBF/CVE-2023-45828)
|
||||
|
||||
|
@ -4615,6 +4493,9 @@
|
|||
### CVE-2023-45966
|
||||
- [jet-pentest/CVE-2023-45966](https://github.com/jet-pentest/CVE-2023-45966)
|
||||
|
||||
### CVE-2023-46003
|
||||
- [leekenghwa/CVE-2023-46003](https://github.com/leekenghwa/CVE-2023-46003)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
||||
|
@ -5654,13 +5535,6 @@
|
|||
### CVE-2022-20128
|
||||
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
|
||||
|
||||
### CVE-2022-20130 (2022-06-15)
|
||||
|
||||
<code>In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
|
||||
|
||||
### CVE-2022-20138 (2022-06-15)
|
||||
|
||||
<code>In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there is a possible way for unprivileged app to send MANAGED_PROFILE_PROVISIONED intent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-210469972
|
||||
|
@ -6307,8 +6181,6 @@
|
|||
- [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954)
|
||||
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
|
||||
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
|
||||
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
|
||||
- [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_)
|
||||
- [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954)
|
||||
|
@ -7937,8 +7809,6 @@
|
|||
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
|
||||
- [xinghonghaoyue/CVE-2022-29464](https://github.com/xinghonghaoyue/CVE-2022-29464)
|
||||
- [r4x0r1337/-CVE-2022-29464](https://github.com/r4x0r1337/-CVE-2022-29464)
|
||||
- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464)
|
||||
- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass)
|
||||
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
|
||||
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
|
||||
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
|
||||
|
@ -13028,6 +12898,7 @@
|
|||
</code>
|
||||
|
||||
- [Betep0k/CVE-2021-25741](https://github.com/Betep0k/CVE-2021-25741)
|
||||
- [cdxiaodong/CVE-2021-25741](https://github.com/cdxiaodong/CVE-2021-25741)
|
||||
|
||||
### CVE-2021-25790 (2021-07-23)
|
||||
|
||||
|
@ -29641,7 +29512,6 @@
|
|||
- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-)
|
||||
- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco)
|
||||
- [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881)
|
||||
- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881)
|
||||
|
||||
### CVE-2017-4490
|
||||
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
|
||||
|
@ -29849,9 +29719,6 @@
|
|||
</code>
|
||||
|
||||
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
|
||||
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
|
||||
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
|
||||
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
|
||||
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
|
||||
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
|
||||
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
|
||||
|
@ -29864,7 +29731,6 @@
|
|||
- [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck)
|
||||
- [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown)
|
||||
- [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown)
|
||||
- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown)
|
||||
- [zzado/Meltdown](https://github.com/zzado/Meltdown)
|
||||
- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner)
|
||||
|
||||
|
@ -30041,7 +29907,6 @@
|
|||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
|
||||
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
|
||||
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
|
||||
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
||||
|
@ -30375,13 +30240,6 @@
|
|||
|
||||
- [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE)
|
||||
|
||||
### CVE-2017-9097 (2017-06-15)
|
||||
|
||||
<code>In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
|
||||
</code>
|
||||
|
||||
- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite)
|
||||
|
||||
### CVE-2017-9101 (2017-05-21)
|
||||
|
||||
<code>import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
|
||||
|
@ -30613,7 +30471,6 @@
|
|||
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
|
||||
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
|
||||
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
|
||||
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
|
||||
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
|
||||
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
|
||||
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
|
||||
|
@ -31246,13 +31103,6 @@
|
|||
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
|
||||
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
|
||||
|
||||
### CVE-2017-16997 (2017-12-17)
|
||||
|
||||
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
|
||||
</code>
|
||||
|
||||
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
|
||||
|
||||
### CVE-2017-17058 (2017-11-29)
|
||||
|
||||
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code.
|
||||
|
@ -31307,13 +31157,6 @@
|
|||
- [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit)
|
||||
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
|
||||
|
||||
### CVE-2017-17692 (2017-12-21)
|
||||
|
||||
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
|
||||
</code>
|
||||
|
||||
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
|
||||
|
||||
### CVE-2017-17736 (2018-03-23)
|
||||
|
||||
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
|
||||
|
@ -31451,7 +31294,6 @@
|
|||
<code>Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
|
||||
</code>
|
||||
|
||||
- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253)
|
||||
- [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253)
|
||||
|
||||
### CVE-2017-1000353 (2018-01-29)
|
||||
|
@ -32252,6 +32094,7 @@
|
|||
|
||||
- [Gnoxter/mountain_goat](https://github.com/Gnoxter/mountain_goat)
|
||||
- [violentshell/rover](https://github.com/violentshell/rover)
|
||||
- [jduck/challack](https://github.com/jduck/challack)
|
||||
- [bplinux/chackd](https://github.com/bplinux/chackd)
|
||||
- [unkaktus/grill](https://github.com/unkaktus/grill)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue