mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/12/21 00:35:46
This commit is contained in:
parent
61b4b632cb
commit
969e98a303
35 changed files with 181 additions and 836 deletions
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 29560903,
|
||||
"name": "CVE-2014-1773",
|
||||
"full_name": "day6reak\/CVE-2014-1773",
|
||||
"owner": {
|
||||
"login": "day6reak",
|
||||
"id": 1537207,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1537207?v=4",
|
||||
"html_url": "https:\/\/github.com\/day6reak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/day6reak\/CVE-2014-1773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-01-20T23:32:21Z",
|
||||
"updated_at": "2015-01-20T23:32:21Z",
|
||||
"pushed_at": "2015-01-20T23:34:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 29561022,
|
||||
"name": "CVE-2014-4109",
|
||||
"full_name": "day6reak\/CVE-2014-4109",
|
||||
"owner": {
|
||||
"login": "day6reak",
|
||||
"id": 1537207,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1537207?v=4",
|
||||
"html_url": "https:\/\/github.com\/day6reak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/day6reak\/CVE-2014-4109",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-01-20T23:35:26Z",
|
||||
"updated_at": "2015-01-20T23:35:26Z",
|
||||
"pushed_at": "2015-01-20T23:37:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 29561747,
|
||||
"name": "CVE-2014-4140",
|
||||
"full_name": "day6reak\/CVE-2014-4140",
|
||||
"owner": {
|
||||
"login": "day6reak",
|
||||
"id": 1537207,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1537207?v=4",
|
||||
"html_url": "https:\/\/github.com\/day6reak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/day6reak\/CVE-2014-4140",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-01-20T23:56:14Z",
|
||||
"updated_at": "2015-01-20T23:56:14Z",
|
||||
"pushed_at": "2015-01-20T23:57:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -964,36 +964,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 32577814,
|
||||
"name": "shellshock_crawler",
|
||||
"full_name": "352926\/shellshock_crawler",
|
||||
"owner": {
|
||||
"login": "352926",
|
||||
"id": 2149434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2149434?v=4",
|
||||
"html_url": "https:\/\/github.com\/352926"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/352926\/shellshock_crawler",
|
||||
"description": "Using google to scan sites for \"ShellShock\" (CVE-2014-6271)",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-20T10:35:29Z",
|
||||
"updated_at": "2015-03-20T10:35:29Z",
|
||||
"pushed_at": "2014-09-27T04:18:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 36965942,
|
||||
"name": "cve-2014-6271-mengjia-kong",
|
||||
|
@ -1241,36 +1211,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 107244024,
|
||||
"name": "shellshock-shell",
|
||||
"full_name": "heikipikker\/shellshock-shell",
|
||||
"owner": {
|
||||
"login": "heikipikker",
|
||||
"id": 16557916,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16557916?v=4",
|
||||
"html_url": "https:\/\/github.com\/heikipikker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/heikipikker\/shellshock-shell",
|
||||
"description": "A simple python shell-like exploit for the Shellschok CVE-2014-6271 bug.",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-17T09:04:44Z",
|
||||
"updated_at": "2022-07-21T14:31:17Z",
|
||||
"pushed_at": "2014-11-28T12:10:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 111820652,
|
||||
"name": "CVE-2014-6271",
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 29238061,
|
||||
"name": "cve-2014-6332",
|
||||
"full_name": "tjjh89017\/cve-2014-6332",
|
||||
"owner": {
|
||||
"login": "tjjh89017",
|
||||
"id": 2821179,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2821179?v=4",
|
||||
"html_url": "https:\/\/github.com\/tjjh89017"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tjjh89017\/cve-2014-6332",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-01-14T09:57:34Z",
|
||||
"updated_at": "2016-06-28T02:17:27Z",
|
||||
"pushed_at": "2015-01-17T15:14:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 66863858,
|
||||
"name": "CVE-2014-6332",
|
||||
|
|
|
@ -452,7 +452,7 @@
|
|||
"stargazers_count": 785,
|
||||
"watchers_count": 785,
|
||||
"has_discussions": false,
|
||||
"forks_count": 434,
|
||||
"forks_count": 435,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -462,7 +462,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 434,
|
||||
"forks": 435,
|
||||
"watchers": 785,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "[CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-25T20:42:47Z",
|
||||
"updated_at": "2022-11-09T17:58:07Z",
|
||||
"updated_at": "2023-12-20T23:49:35Z",
|
||||
"pushed_at": "2018-01-15T19:26:45Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -299,36 +299,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 328929654,
|
||||
"name": "CVE-2017-12615-EXP",
|
||||
"full_name": "w0x68y\/CVE-2017-12615-EXP",
|
||||
"owner": {
|
||||
"login": "w0x68y",
|
||||
"id": 22195911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
|
||||
"html_url": "https:\/\/github.com\/w0x68y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP",
|
||||
"description": "CVE-2017-12615 任意文件写入exp,写入webshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T09:07:12Z",
|
||||
"updated_at": "2022-10-23T07:40:44Z",
|
||||
"pushed_at": "2021-01-13T03:23:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 565419626,
|
||||
"name": "AttackTomcat",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 327169091,
|
||||
"name": "CVE-2017-16651",
|
||||
"full_name": "ropbear\/CVE-2017-16651",
|
||||
"owner": {
|
||||
"login": "ropbear",
|
||||
"id": 11134586,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134586?v=4",
|
||||
"html_url": "https:\/\/github.com\/ropbear"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ropbear\/CVE-2017-16651",
|
||||
"description": "Python implementation of Roundcube LFI (CVE-2017-16651)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-06T01:46:39Z",
|
||||
"updated_at": "2023-09-24T16:23:48Z",
|
||||
"pushed_at": "2021-01-06T01:47:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -59,36 +59,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 312471106,
|
||||
"name": "cve-2017-7921-golang",
|
||||
"full_name": "MisakaMikato\/cve-2017-7921-golang",
|
||||
"owner": {
|
||||
"login": "MisakaMikato",
|
||||
"id": 31957147,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957147?v=4",
|
||||
"html_url": "https:\/\/github.com\/MisakaMikato"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang",
|
||||
"description": "Hikvision IP camera access bypass exploit, developed by golang. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T04:15:31Z",
|
||||
"updated_at": "2023-06-25T06:04:21Z",
|
||||
"pushed_at": "2021-01-11T05:52:22Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 334195499,
|
||||
"name": "hikvision_CVE-2017-7921_auth_bypass_config_decryptor",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 120640426,
|
||||
"name": "CVE-2018-0101-DOS-POC",
|
||||
"full_name": "1337g\/CVE-2018-0101-DOS-POC",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2018-0101-DOS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T16:25:59Z",
|
||||
"updated_at": "2023-09-28T10:48:06Z",
|
||||
"pushed_at": "2018-02-07T16:43:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 120782386,
|
||||
"name": "ciscoasa_honeypot",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 118851943,
|
||||
"name": "CVE-2018-1000006-DEMO",
|
||||
"full_name": "CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"owner": {
|
||||
"login": "CHYbeta",
|
||||
"id": 18642224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18642224?v=4",
|
||||
"html_url": "https:\/\/github.com\/CHYbeta"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"description": "The Demo for CVE-2018-1000006",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T02:38:44Z",
|
||||
"updated_at": "2023-09-28T10:47:45Z",
|
||||
"pushed_at": "2018-01-25T03:29:30Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 119399468,
|
||||
"name": "CVE-2018-2636",
|
||||
"full_name": "erpscanteam\/CVE-2018-2636",
|
||||
"owner": {
|
||||
"login": "erpscanteam",
|
||||
"id": 35491827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35491827?v=4",
|
||||
"html_url": "https:\/\/github.com\/erpscanteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erpscanteam\/CVE-2018-2636",
|
||||
"description": "ERPScan Public POC for CVE-2018-2636",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T15:16:02Z",
|
||||
"updated_at": "2023-09-28T10:47:52Z",
|
||||
"pushed_at": "2018-02-01T15:36:19Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 120569870,
|
||||
"name": "micros_honeypot",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 120301126,
|
||||
"name": "Trend_Micro_POC",
|
||||
"full_name": "gguaiker\/Trend_Micro_POC",
|
||||
"owner": {
|
||||
"login": "gguaiker",
|
||||
"id": 35134599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35134599?v=4",
|
||||
"html_url": "https:\/\/github.com\/gguaiker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gguaiker\/Trend_Micro_POC",
|
||||
"description": "CVE-2018-3608 Trend_Micro_CVE",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T12:22:28Z",
|
||||
"updated_at": "2019-09-27T17:09:24Z",
|
||||
"pushed_at": "2018-02-05T12:55:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -31,36 +31,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 120909146,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "mdsecactivebreach\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "mdsecactivebreach",
|
||||
"id": 29373540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29373540?v=4",
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach\/CVE-2018-4878",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T13:30:46Z",
|
||||
"updated_at": "2023-09-28T10:48:10Z",
|
||||
"pushed_at": "2018-02-09T14:38:27Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 120962228,
|
||||
"name": "CVE-2018-4878",
|
||||
|
|
|
@ -1,62 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 119782218,
|
||||
"name": "Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"full_name": "huzhenghui\/Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"owner": {
|
||||
"login": "huzhenghui",
|
||||
"id": 4843755,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4843755?v=4",
|
||||
"html_url": "https:\/\/github.com\/huzhenghui"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huzhenghui\/Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-01T04:21:13Z",
|
||||
"updated_at": "2018-02-02T07:40:36Z",
|
||||
"pushed_at": "2018-02-01T06:24:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 119790221,
|
||||
"name": "Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"full_name": "huzhenghui\/Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"owner": {
|
||||
"login": "huzhenghui",
|
||||
"id": 4843755,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4843755?v=4",
|
||||
"html_url": "https:\/\/github.com\/huzhenghui"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huzhenghui\/Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-01T06:00:14Z",
|
||||
"updated_at": "2018-02-02T04:30:18Z",
|
||||
"pushed_at": "2018-02-01T06:23:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,124 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 120386140,
|
||||
"name": "wordpress-fix-cve-2018-6389",
|
||||
"full_name": "yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "yolabingo",
|
||||
"id": 628954,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628954?v=4",
|
||||
"html_url": "https:\/\/github.com\/yolabingo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"description": "Apache RewriteRule to mitigate potential DoS attack via Wordpress wp-admin\/load-scripts.php file",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T01:43:33Z",
|
||||
"updated_at": "2018-02-08T01:19:57Z",
|
||||
"pushed_at": "2018-02-06T01:46:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 120477120,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "safebuffer\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "safebuffer",
|
||||
"id": 20618414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4",
|
||||
"html_url": "https:\/\/github.com\/safebuffer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/safebuffer\/CVE-2018-6389",
|
||||
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T15:16:03Z",
|
||||
"updated_at": "2023-09-16T21:10:16Z",
|
||||
"pushed_at": "2018-02-06T15:36:29Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 120533146,
|
||||
"name": "modsecurity-cve-2018-6389",
|
||||
"full_name": "rastating\/modsecurity-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "rastating",
|
||||
"id": 2500434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2500434?v=4",
|
||||
"html_url": "https:\/\/github.com\/rastating"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rastating\/modsecurity-cve-2018-6389",
|
||||
"description": "A ModSecurity ruleset for detecting potential attacks using CVE-2018-6389",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T22:51:21Z",
|
||||
"updated_at": "2023-01-28T12:14:07Z",
|
||||
"pushed_at": "2018-02-07T01:05:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 120540306,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "knqyf263\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-6389",
|
||||
"description": "WordPress DoS (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T00:20:57Z",
|
||||
"updated_at": "2020-01-17T20:42:25Z",
|
||||
"pushed_at": "2018-02-07T00:43:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 120617956,
|
||||
"name": "cve-2018-6389-php-patcher",
|
||||
|
|
|
@ -1,37 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 119438300,
|
||||
"name": "ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"full_name": "dreadlocked\/ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"owner": {
|
||||
"login": "dreadlocked",
|
||||
"id": 7407033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7407033?v=4",
|
||||
"html_url": "https:\/\/github.com\/dreadlocked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dreadlocked\/ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"description": "[CVE-2018-6407 & CVE-2018-6408] Conceptronic IPCam Administration panel CSRF and Denial of Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T20:36:54Z",
|
||||
"updated_at": "2023-02-10T14:14:48Z",
|
||||
"pushed_at": "2018-01-31T00:13:31Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"csrf",
|
||||
"denial-of-service",
|
||||
"disclosure",
|
||||
"vulnerabilities"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 119714188,
|
||||
"name": "netwave-dosvulnerability",
|
||||
"full_name": "dreadlocked\/netwave-dosvulnerability",
|
||||
"owner": {
|
||||
"login": "dreadlocked",
|
||||
"id": 7407033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7407033?v=4",
|
||||
"html_url": "https:\/\/github.com\/dreadlocked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dreadlocked\/netwave-dosvulnerability",
|
||||
"description": "[CVE-2018-6479] Netwave IP Camera server vulnerable to Denial of Service via one single huge POST request.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-31T16:38:48Z",
|
||||
"updated_at": "2023-09-28T10:47:55Z",
|
||||
"pushed_at": "2018-02-01T20:08:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 460682978,
|
||||
"name": "Tool_Camera_Exploit_Netwave_CVE-2018-6479",
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -218,7 +218,7 @@
|
|||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 261951068,
|
||||
|
|
|
@ -32,6 +32,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T17:32:24Z",
|
||||
"updated_at": "2023-11-27T20:59:27Z",
|
||||
"updated_at": "2023-12-20T23:48:30Z",
|
||||
"pushed_at": "2021-01-23T01:25:22Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 136,
|
||||
"watchers": 137,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -9450,10 +9450,10 @@
|
|||
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T22:14:24Z",
|
||||
"updated_at": "2023-11-15T04:30:20Z",
|
||||
"updated_at": "2023-12-20T18:56:50Z",
|
||||
"pushed_at": "2022-01-10T19:13:04Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -9469,7 +9469,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 57,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "Bitbucket CVE-2022-36804 unauthenticated remote command execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-21T10:36:50Z",
|
||||
"updated_at": "2023-09-28T11:42:53Z",
|
||||
"updated_at": "2023-12-20T23:30:19Z",
|
||||
"pushed_at": "2023-01-21T02:14:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -190,7 +190,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -179,41 +179,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 585696186,
|
||||
"name": "sw1tch",
|
||||
"full_name": "staturnzz\/sw1tch",
|
||||
"owner": {
|
||||
"login": "staturnzz",
|
||||
"id": 118011249,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118011249?v=4",
|
||||
"html_url": "https:\/\/github.com\/staturnzz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/staturnzz\/sw1tch",
|
||||
"description": "poc of CVE-2022-46689 written purely in swift",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T20:47:12Z",
|
||||
"updated_at": "2023-12-13T19:07:27Z",
|
||||
"pushed_at": "2023-01-11T19:44:48Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2022-46689",
|
||||
"ios",
|
||||
"swift"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 585711274,
|
||||
"name": "FileSwitcherX",
|
||||
|
@ -412,5 +377,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 634201810,
|
||||
"name": "sw1tch",
|
||||
"full_name": "69camau\/sw1tch",
|
||||
"owner": {
|
||||
"login": "69camau",
|
||||
"id": 131466913,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131466913?v=4",
|
||||
"html_url": "https:\/\/github.com\/69camau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/69camau\/sw1tch",
|
||||
"description": "poc of CVE-2022-46689 written purely in swift",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-29T11:21:40Z",
|
||||
"updated_at": "2023-04-29T11:21:40Z",
|
||||
"pushed_at": "2023-01-11T19:44:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1205,5 +1205,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 734079534,
|
||||
"name": "CVE-2023-23752",
|
||||
"full_name": "TindalyTn\/CVE-2023-23752",
|
||||
"owner": {
|
||||
"login": "TindalyTn",
|
||||
"id": 104759010,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104759010?v=4",
|
||||
"html_url": "https:\/\/github.com\/TindalyTn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TindalyTn\/CVE-2023-23752",
|
||||
"description": "Mass Scanner for CVE-2023-23752",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-20T20:20:15Z",
|
||||
"updated_at": "2023-12-20T20:21:34Z",
|
||||
"pushed_at": "2023-12-20T20:22:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T05:06:27Z",
|
||||
"updated_at": "2023-12-20T09:37:34Z",
|
||||
"updated_at": "2023-12-20T21:37:28Z",
|
||||
"pushed_at": "2023-07-29T16:58:16Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T17:56:55Z",
|
||||
"updated_at": "2023-12-03T18:02:09Z",
|
||||
"updated_at": "2023-12-20T23:21:17Z",
|
||||
"pushed_at": "2023-09-26T19:02:07Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2023-12-13T18:31:23Z",
|
||||
"updated_at": "2023-12-20T21:44:40Z",
|
||||
"pushed_at": "2023-10-20T23:04:03Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 168,
|
||||
"watchers": 169,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-20T04:43:15Z",
|
||||
"updated_at": "2023-12-20T05:08:55Z",
|
||||
"updated_at": "2023-12-20T22:30:10Z",
|
||||
"pushed_at": "2023-12-20T04:43:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-20T08:46:19Z",
|
||||
"updated_at": "2023-12-20T11:50:14Z",
|
||||
"updated_at": "2023-12-20T19:45:48Z",
|
||||
"pushed_at": "2023-12-20T12:57:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
32
2023/CVE-2023-50596.json
Normal file
32
2023/CVE-2023-50596.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 734100171,
|
||||
"name": "CVE-2023-50596",
|
||||
"full_name": "chandraprarikraj\/CVE-2023-50596",
|
||||
"owner": {
|
||||
"login": "chandraprarikraj",
|
||||
"id": 154472358,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154472358?v=4",
|
||||
"html_url": "https:\/\/github.com\/chandraprarikraj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chandraprarikraj\/CVE-2023-50596",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-20T21:43:28Z",
|
||||
"updated_at": "2023-12-20T21:43:28Z",
|
||||
"pushed_at": "2023-12-20T21:44:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51214.json
Normal file
32
2023/CVE-2023-51214.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 734095645,
|
||||
"name": "CVE-2023-51214",
|
||||
"full_name": "chandraprarikraj\/CVE-2023-51214",
|
||||
"owner": {
|
||||
"login": "chandraprarikraj",
|
||||
"id": 154472358,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154472358?v=4",
|
||||
"html_url": "https:\/\/github.com\/chandraprarikraj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chandraprarikraj\/CVE-2023-51214",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-20T21:23:33Z",
|
||||
"updated_at": "2023-12-20T21:23:34Z",
|
||||
"pushed_at": "2023-12-20T21:35:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
101
README.md
101
README.md
|
@ -1768,6 +1768,7 @@
|
|||
- [C1ph3rX13/CVE-2023-23752](https://github.com/C1ph3rX13/CVE-2023-23752)
|
||||
- [JeneralMotors/CVE-2023-23752](https://github.com/JeneralMotors/CVE-2023-23752)
|
||||
- [gunzf0x/CVE-2023-23752](https://github.com/gunzf0x/CVE-2023-23752)
|
||||
- [TindalyTn/CVE-2023-23752](https://github.com/TindalyTn/CVE-2023-23752)
|
||||
|
||||
### CVE-2023-23924 (2023-01-31)
|
||||
|
||||
|
@ -5911,6 +5912,9 @@
|
|||
- [Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE](https://github.com/Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE)
|
||||
- [Trackflaw/CVE-2023-50164-ApacheStruts2-Docker](https://github.com/Trackflaw/CVE-2023-50164-ApacheStruts2-Docker)
|
||||
|
||||
### CVE-2023-50596
|
||||
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)
|
||||
|
||||
### CVE-2023-50643
|
||||
- [V3x0r/CVE-2023-50643](https://github.com/V3x0r/CVE-2023-50643)
|
||||
|
||||
|
@ -5921,6 +5925,9 @@
|
|||
|
||||
- [Chocapikk/CVE-2023-50917](https://github.com/Chocapikk/CVE-2023-50917)
|
||||
|
||||
### CVE-2023-51214
|
||||
- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
||||
|
@ -7889,7 +7896,7 @@
|
|||
|
||||
### CVE-2022-23270 (2022-05-10)
|
||||
|
||||
<code>Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21972.
|
||||
<code>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [corelight/CVE-2022-23270-PPTP](https://github.com/corelight/CVE-2022-23270-PPTP)
|
||||
|
@ -8813,7 +8820,7 @@
|
|||
|
||||
### CVE-2022-26923 (2022-05-10)
|
||||
|
||||
<code>Active Directory Domain Services Elevation of Privilege Vulnerability.
|
||||
<code>Active Directory Domain Services Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [r1skkam/TryHackMe-CVE-2022-26923](https://github.com/r1skkam/TryHackMe-CVE-2022-26923)
|
||||
|
@ -8824,14 +8831,14 @@
|
|||
|
||||
### CVE-2022-26927 (2022-05-10)
|
||||
|
||||
<code>Windows Graphics Component Remote Code Execution Vulnerability.
|
||||
<code>Windows Graphics Component Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [CrackerCat/CVE-2022-26927](https://github.com/CrackerCat/CVE-2022-26927)
|
||||
|
||||
### CVE-2022-26937 (2022-05-10)
|
||||
|
||||
<code>Windows Network File System Remote Code Execution Vulnerability.
|
||||
<code>Windows Network File System Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [corelight/CVE-2022-26937](https://github.com/corelight/CVE-2022-26937)
|
||||
|
@ -9469,14 +9476,14 @@
|
|||
|
||||
### CVE-2022-30129 (2022-05-10)
|
||||
|
||||
<code>Visual Studio Code Remote Code Execution Vulnerability.
|
||||
<code>Visual Studio Code Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [RoccoPearce/CVE-2022-30129](https://github.com/RoccoPearce/CVE-2022-30129)
|
||||
|
||||
### CVE-2022-30136 (2022-06-15)
|
||||
|
||||
<code>Windows Network File System Remote Code Execution Vulnerability.
|
||||
<code>Windows Network File System Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [fortra/CVE-2022-30136](https://github.com/fortra/CVE-2022-30136)
|
||||
|
@ -9484,7 +9491,7 @@
|
|||
|
||||
### CVE-2022-30190 (2022-06-01)
|
||||
|
||||
<code>Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
|
||||
<code><p>A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.</p>\n<p>Please see the <a href="https://aka.ms/CVE-2022-30190-Guidance">MSRC Blog Entry</a> for important information about steps you can take to protect your system from this vulnerability.</p>\n
|
||||
</code>
|
||||
|
||||
- [flux10n/CVE-2022-30190](https://github.com/flux10n/CVE-2022-30190)
|
||||
|
@ -11089,21 +11096,21 @@
|
|||
|
||||
### CVE-2022-41032 (2022-10-11)
|
||||
|
||||
<code>NuGet Client Elevation of Privilege Vulnerability.
|
||||
<code>NuGet Client Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [ethomson/cve-2022-41032](https://github.com/ethomson/cve-2022-41032)
|
||||
|
||||
### CVE-2022-41034 (2022-10-11)
|
||||
|
||||
<code>Visual Studio Code Remote Code Execution Vulnerability.
|
||||
<code>Visual Studio Code Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [andyhsu024/CVE-2022-41034](https://github.com/andyhsu024/CVE-2022-41034)
|
||||
|
||||
### CVE-2022-41040 (2022-10-02)
|
||||
|
||||
<code>Microsoft Exchange Server Elevation of Privilege Vulnerability.
|
||||
<code>Microsoft Exchange Server Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [numanturle/CVE-2022-41040](https://github.com/numanturle/CVE-2022-41040)
|
||||
|
@ -11138,7 +11145,7 @@
|
|||
|
||||
### CVE-2022-41082 (2022-10-02)
|
||||
|
||||
<code>Microsoft Exchange Server Remote Code Execution Vulnerability.
|
||||
<code>Microsoft Exchange Server Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [Diverto/nse-exchange](https://github.com/Diverto/nse-exchange)
|
||||
|
@ -12070,13 +12077,13 @@
|
|||
- [mineek/FileManager](https://github.com/mineek/FileManager)
|
||||
- [straight-tamago/NoHomeBar](https://github.com/straight-tamago/NoHomeBar)
|
||||
- [straight-tamago/DockTransparent](https://github.com/straight-tamago/DockTransparent)
|
||||
- [staturnzz/sw1tch](https://github.com/staturnzz/sw1tch)
|
||||
- [straight-tamago/FileSwitcherX](https://github.com/straight-tamago/FileSwitcherX)
|
||||
- [BomberFish/Mandela-Legacy](https://github.com/BomberFish/Mandela-Legacy)
|
||||
- [BomberFish/JailedCement](https://github.com/BomberFish/JailedCement)
|
||||
- [BomberFish/Mandela-Classic](https://github.com/BomberFish/Mandela-Classic)
|
||||
- [enty8080/MacDirtyCow](https://github.com/enty8080/MacDirtyCow)
|
||||
- [tdquang266/MDC](https://github.com/tdquang266/MDC)
|
||||
- [69camau/sw1tch](https://github.com/69camau/sw1tch)
|
||||
|
||||
### CVE-2022-46718 (2023-06-23)
|
||||
|
||||
|
@ -27816,7 +27823,6 @@
|
|||
<code>A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618.
|
||||
</code>
|
||||
|
||||
- [1337g/CVE-2018-0101-DOS-POC](https://github.com/1337g/CVE-2018-0101-DOS-POC)
|
||||
- [Cymmetria/ciscoasa_honeypot](https://github.com/Cymmetria/ciscoasa_honeypot)
|
||||
|
||||
### CVE-2018-0114 (2018-01-04)
|
||||
|
@ -28166,7 +28172,6 @@
|
|||
<code>Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). Supported versions that are affected are 2.7, 2.8 and 2.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [erpscanteam/CVE-2018-2636](https://github.com/erpscanteam/CVE-2018-2636)
|
||||
- [Cymmetria/micros_honeypot](https://github.com/Cymmetria/micros_honeypot)
|
||||
|
||||
### CVE-2018-2844 (2018-04-18)
|
||||
|
@ -28248,13 +28253,6 @@
|
|||
- [ndureiss/e1000_vulnerability_exploit](https://github.com/ndureiss/e1000_vulnerability_exploit)
|
||||
- [vhok74/cve-2018-3295](https://github.com/vhok74/cve-2018-3295)
|
||||
|
||||
### CVE-2018-3608 (2018-07-06)
|
||||
|
||||
<code>A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
|
||||
</code>
|
||||
|
||||
- [gguaiker/Trend_Micro_POC](https://github.com/gguaiker/Trend_Micro_POC)
|
||||
|
||||
### CVE-2018-3639 (2018-05-22)
|
||||
|
||||
<code>Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
|
||||
|
@ -28509,7 +28507,6 @@
|
|||
</code>
|
||||
|
||||
- [ydl555/CVE-2018-4878-](https://github.com/ydl555/CVE-2018-4878-)
|
||||
- [mdsecactivebreach/CVE-2018-4878](https://github.com/mdsecactivebreach/CVE-2018-4878)
|
||||
- [hybridious/CVE-2018-4878](https://github.com/hybridious/CVE-2018-4878)
|
||||
- [vysecurity/CVE-2018-4878](https://github.com/vysecurity/CVE-2018-4878)
|
||||
- [KathodeN/CVE-2018-4878](https://github.com/KathodeN/CVE-2018-4878)
|
||||
|
@ -28576,14 +28573,6 @@
|
|||
|
||||
- [missing0x00/CVE-2018-5354](https://github.com/missing0x00/CVE-2018-5354)
|
||||
|
||||
### CVE-2018-5711 (2018-01-16)
|
||||
|
||||
<code>gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
|
||||
</code>
|
||||
|
||||
- [huzhenghui/Test-7-2-0-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-0-PHP-CVE-2018-5711)
|
||||
- [huzhenghui/Test-7-2-1-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-1-PHP-CVE-2018-5711)
|
||||
|
||||
### CVE-2018-5728 (2018-01-16)
|
||||
|
||||
<code>Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information via a /cgi-bin/getSysStatus request, as demonstrated by the Latitude/Longitude of the ship, or satellite details.
|
||||
|
@ -28673,10 +28662,6 @@
|
|||
<code>In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.
|
||||
</code>
|
||||
|
||||
- [yolabingo/wordpress-fix-cve-2018-6389](https://github.com/yolabingo/wordpress-fix-cve-2018-6389)
|
||||
- [safebuffer/CVE-2018-6389](https://github.com/safebuffer/CVE-2018-6389)
|
||||
- [rastating/modsecurity-cve-2018-6389](https://github.com/rastating/modsecurity-cve-2018-6389)
|
||||
- [knqyf263/CVE-2018-6389](https://github.com/knqyf263/CVE-2018-6389)
|
||||
- [JulienGadanho/cve-2018-6389-php-patcher](https://github.com/JulienGadanho/cve-2018-6389-php-patcher)
|
||||
- [dsfau/wordpress-CVE-2018-6389](https://github.com/dsfau/wordpress-CVE-2018-6389)
|
||||
- [Jetserver/CVE-2018-6389-FIX](https://github.com/Jetserver/CVE-2018-6389-FIX)
|
||||
|
@ -28702,19 +28687,11 @@
|
|||
|
||||
- [JavierOlmedo/joomla-cve-2018-6396](https://github.com/JavierOlmedo/joomla-cve-2018-6396)
|
||||
|
||||
### CVE-2018-6407 (2018-01-30)
|
||||
|
||||
<code>An issue was discovered on Conceptronic CIPCAMPTIWL V3 0.61.30.21 devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to /hy-cgi/devices.cgi?cmd=searchlandevice. The crash completely freezes the device.
|
||||
</code>
|
||||
|
||||
- [dreadlocked/ConceptronicIPCam_MultipleVulnerabilities](https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities)
|
||||
|
||||
### CVE-2018-6479 (2018-01-31)
|
||||
|
||||
<code>An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
|
||||
</code>
|
||||
|
||||
- [dreadlocked/netwave-dosvulnerability](https://github.com/dreadlocked/netwave-dosvulnerability)
|
||||
- [LeQuocKhanh2K/Tool_Camera_Exploit_Netwave_CVE-2018-6479](https://github.com/LeQuocKhanh2K/Tool_Camera_Exploit_Netwave_CVE-2018-6479)
|
||||
|
||||
### CVE-2018-6518 (2018-04-26)
|
||||
|
@ -31043,13 +31020,6 @@
|
|||
- [0x00-0x00/CVE-2018-1000001](https://github.com/0x00-0x00/CVE-2018-1000001)
|
||||
- [usernameid0/tools-for-CVE-2018-1000001](https://github.com/usernameid0/tools-for-CVE-2018-1000001)
|
||||
|
||||
### CVE-2018-1000006 (2018-01-24)
|
||||
|
||||
<code>GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
|
||||
</code>
|
||||
|
||||
- [CHYbeta/CVE-2018-1000006-DEMO](https://github.com/CHYbeta/CVE-2018-1000006-DEMO)
|
||||
|
||||
### CVE-2018-1000030 (2018-02-08)
|
||||
|
||||
<code>Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.
|
||||
|
@ -32134,7 +32104,6 @@
|
|||
|
||||
- [JrDw0/CVE-2017-7921-EXP](https://github.com/JrDw0/CVE-2017-7921-EXP)
|
||||
- [BurnyMcDull/CVE-2017-7921](https://github.com/BurnyMcDull/CVE-2017-7921)
|
||||
- [MisakaMikato/cve-2017-7921-golang](https://github.com/MisakaMikato/cve-2017-7921-golang)
|
||||
- [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
|
||||
- [p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
|
||||
- [201646613/CVE-2017-7921](https://github.com/201646613/CVE-2017-7921)
|
||||
|
@ -32831,7 +32800,6 @@
|
|||
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
|
||||
- [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615)
|
||||
- [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615)
|
||||
- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP)
|
||||
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
|
||||
- [xiaokp7/Tomcat_PUT_GUI_EXP](https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP)
|
||||
|
||||
|
@ -33142,13 +33110,6 @@
|
|||
|
||||
- [dewankpant/CVE-2017-16568](https://github.com/dewankpant/CVE-2017-16568)
|
||||
|
||||
### CVE-2017-16651 (2017-11-09)
|
||||
|
||||
<code>Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
|
||||
</code>
|
||||
|
||||
- [ropbear/CVE-2017-16651](https://github.com/ropbear/CVE-2017-16651)
|
||||
|
||||
### CVE-2017-16720 (2018-01-05)
|
||||
|
||||
<code>A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device.
|
||||
|
@ -35847,13 +35808,6 @@
|
|||
|
||||
- [ExploitCN/CVE-2014-1767-EXP-PAPER](https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER)
|
||||
|
||||
### CVE-2014-1773 (2014-06-10)
|
||||
|
||||
<code>Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1783, CVE-2014-1784, CVE-2014-1786, CVE-2014-1795, CVE-2014-1805, CVE-2014-2758, CVE-2014-2759, CVE-2014-2765, CVE-2014-2766, and CVE-2014-2775.
|
||||
</code>
|
||||
|
||||
- [day6reak/CVE-2014-1773](https://github.com/day6reak/CVE-2014-1773)
|
||||
|
||||
### CVE-2014-1812 (2014-05-14)
|
||||
|
||||
<code>The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability."
|
||||
|
@ -36022,13 +35976,6 @@
|
|||
|
||||
- [fungoshacks/CVE-2014-4076](https://github.com/fungoshacks/CVE-2014-4076)
|
||||
|
||||
### CVE-2014-4109 (2014-09-09)
|
||||
|
||||
<code>Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014-4081, CVE-2014-4083, CVE-2014-4085, CVE-2014-4088, CVE-2014-4090, CVE-2014-4094, CVE-2014-4097, CVE-2014-4100, CVE-2014-4103, CVE-2014-4104, CVE-2014-4105, CVE-2014-4106, CVE-2014-4107, CVE-2014-4108, CVE-2014-4110, and CVE-2014-4111.
|
||||
</code>
|
||||
|
||||
- [day6reak/CVE-2014-4109](https://github.com/day6reak/CVE-2014-4109)
|
||||
|
||||
### CVE-2014-4113 (2014-10-15)
|
||||
|
||||
<code>win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
|
||||
|
@ -36039,13 +35986,6 @@
|
|||
- [sam-b/CVE-2014-4113](https://github.com/sam-b/CVE-2014-4113)
|
||||
- [wikiZ/cve-2014-4113](https://github.com/wikiZ/cve-2014-4113)
|
||||
|
||||
### CVE-2014-4140 (2014-10-15)
|
||||
|
||||
<code>Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."
|
||||
</code>
|
||||
|
||||
- [day6reak/CVE-2014-4140](https://github.com/day6reak/CVE-2014-4140)
|
||||
|
||||
### CVE-2014-4210 (2014-07-16)
|
||||
|
||||
<code>Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
|
||||
|
@ -36199,7 +36139,6 @@
|
|||
- [indiandragon/Shellshock-Vulnerability-Scan](https://github.com/indiandragon/Shellshock-Vulnerability-Scan)
|
||||
- [ramnes/pyshellshock](https://github.com/ramnes/pyshellshock)
|
||||
- [akiraaisha/shellshocker-python](https://github.com/akiraaisha/shellshocker-python)
|
||||
- [352926/shellshock_crawler](https://github.com/352926/shellshock_crawler)
|
||||
- [kelleykong/cve-2014-6271-mengjia-kong](https://github.com/kelleykong/cve-2014-6271-mengjia-kong)
|
||||
- [huanlu/cve-2014-6271-huan-lu](https://github.com/huanlu/cve-2014-6271-huan-lu)
|
||||
- [sunnyjiang/shellshocker-android](https://github.com/sunnyjiang/shellshocker-android)
|
||||
|
@ -36208,7 +36147,6 @@
|
|||
- [opsxcq/exploit-CVE-2014-6271](https://github.com/opsxcq/exploit-CVE-2014-6271)
|
||||
- [Pilou-Pilou/docker_CVE-2014-6271.](https://github.com/Pilou-Pilou/docker_CVE-2014-6271.)
|
||||
- [zalalov/CVE-2014-6271](https://github.com/zalalov/CVE-2014-6271)
|
||||
- [heikipikker/shellshock-shell](https://github.com/heikipikker/shellshock-shell)
|
||||
- [0x00-0x00/CVE-2014-6271](https://github.com/0x00-0x00/CVE-2014-6271)
|
||||
- [kowshik-sundararajan/CVE-2014-6271](https://github.com/kowshik-sundararajan/CVE-2014-6271)
|
||||
- [w4fz5uck5/ShockZaum-CVE-2014-6271](https://github.com/w4fz5uck5/ShockZaum-CVE-2014-6271)
|
||||
|
@ -36259,7 +36197,6 @@
|
|||
</code>
|
||||
|
||||
- [MarkoArmitage/metasploit-framework](https://github.com/MarkoArmitage/metasploit-framework)
|
||||
- [tjjh89017/cve-2014-6332](https://github.com/tjjh89017/cve-2014-6332)
|
||||
- [mourr/CVE-2014-6332](https://github.com/mourr/CVE-2014-6332)
|
||||
|
||||
### CVE-2014-6577 (2015-01-21)
|
||||
|
|
Loading…
Reference in a new issue