Auto Update 2023/10/09 00:25:18

This commit is contained in:
motikan2010-bot 2023-10-09 09:25:18 +09:00
parent 77c492e7b7
commit 99b9270d89
29 changed files with 151 additions and 112 deletions

32
2005/CVE-2005-3299.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 495096042,
"name": "CVE-2005-3299",
"full_name": "RizeKishimaro\/CVE-2005-3299",
"owner": {
"login": "RizeKishimaro",
"id": 75617768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75617768?v=4",
"html_url": "https:\/\/github.com\/RizeKishimaro"
},
"html_url": "https:\/\/github.com\/RizeKishimaro\/CVE-2005-3299",
"description": "CVE 2005 exploit.Perl in Perl.",
"fork": false,
"created_at": "2022-05-22T15:14:57Z",
"updated_at": "2022-06-01T09:55:14Z",
"pushed_at": "2022-05-22T15:25:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -703,10 +703,10 @@
"description": "A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server",
"fork": false,
"created_at": "2014-09-28T04:08:07Z",
"updated_at": "2022-02-05T11:05:37Z",
"updated_at": "2023-10-08T19:41:46Z",
"pushed_at": "2015-06-19T04:48:17Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -715,7 +715,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2023-09-28T10:44:36Z",
"updated_at": "2023-10-08T19:09:06Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 453,
"watchers_count": 453,
"stargazers_count": 454,
"watchers_count": 454,
"has_discussions": false,
"forks_count": 200,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 200,
"watchers": 453,
"watchers": 454,
"score": 0,
"subscribers_count": 46
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
"fork": false,
"created_at": "2017-08-04T01:12:47Z",
"updated_at": "2023-09-28T10:43:33Z",
"updated_at": "2023-10-08T19:09:46Z",
"pushed_at": "2018-11-18T11:14:20Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 2
},

View file

@ -133,10 +133,10 @@
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2023-09-28T10:54:55Z",
"updated_at": "2023-10-08T20:54:05Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 231,
"watchers_count": 231,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 230,
"watchers": 231,
"score": 0,
"subscribers_count": 18
},

View file

@ -2051,10 +2051,10 @@
"description": "Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS\/SSL and x509 support",
"fork": false,
"created_at": "2019-06-03T07:49:26Z",
"updated_at": "2023-10-08T07:02:15Z",
"updated_at": "2023-10-08T23:18:37Z",
"pushed_at": "2019-06-12T08:48:17Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -2067,7 +2067,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2023-10-03T20:00:19Z",
"updated_at": "2023-10-08T19:08:59Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 178,
"watchers": 179,
"score": 0,
"subscribers_count": 3
},

View file

@ -357,10 +357,10 @@
"description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-12T23:13:56Z",
"updated_at": "2023-09-28T11:09:59Z",
"updated_at": "2023-10-08T22:49:14Z",
"pushed_at": "2020-02-05T11:45:25Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -369,7 +369,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 5
},

View file

@ -1384,10 +1384,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2023-09-28T11:14:22Z",
"updated_at": "2023-10-08T19:08:26Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 501,
"watchers_count": 501,
"stargazers_count": 502,
"watchers_count": 502,
"has_discussions": false,
"forks_count": 161,
"allow_forking": true,
@ -1402,7 +1402,7 @@
],
"visibility": "public",
"forks": 161,
"watchers": 501,
"watchers": 502,
"score": 0,
"subscribers_count": 23
},

View file

@ -903,6 +903,6 @@
"forks": 14,
"watchers": 91,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-9054 PoC for Zyxel",
"fork": false,
"created_at": "2021-09-09T16:16:34Z",
"updated_at": "2021-09-18T07:56:17Z",
"updated_at": "2023-10-08T23:35:13Z",
"pushed_at": "2021-09-09T16:18:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2023-10-06T01:52:01Z",
"updated_at": "2023-10-08T19:34:12Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 939,
"watchers_count": 939,
"stargazers_count": 940,
"watchers_count": 940,
"has_discussions": false,
"forks_count": 230,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 939,
"watchers": 940,
"score": 0,
"subscribers_count": 26
},

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2023-10-04T16:05:27Z",
"updated_at": "2023-10-08T19:06:24Z",
"pushed_at": "2023-01-19T16:24:33Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 212,
"watchers": 213,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2023-10-08T14:29:18Z",
"updated_at": "2023-10-08T19:00:43Z",
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"has_discussions": false,
"forks_count": 127,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 127,
"watchers": 359,
"watchers": 360,
"score": 0,
"subscribers_count": 4
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-09-28T11:31:19Z",
"updated_at": "2023-10-08T21:46:05Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1494,
"watchers_count": 1494,
"stargazers_count": 1493,
"watchers_count": 1493,
"has_discussions": false,
"forks_count": 492,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 492,
"watchers": 1494,
"watchers": 1493,
"score": 0,
"subscribers_count": 28
},

View file

@ -6067,10 +6067,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-14T21:32:42Z",
"updated_at": "2023-09-29T11:56:40Z",
"updated_at": "2023-10-08T19:09:47Z",
"pushed_at": "2021-12-15T11:23:38Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -6079,7 +6079,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -1185,10 +1185,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-10-03T20:29:42Z",
"updated_at": "2023-10-08T19:42:15Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 453,
"watchers_count": 453,
"stargazers_count": 454,
"watchers_count": 454,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -1197,7 +1197,7 @@
"topics": [],
"visibility": "public",
"forks": 129,
"watchers": 453,
"watchers": 454,
"score": 0,
"subscribers_count": 15
},

View file

@ -235,10 +235,10 @@
"description": "RCE POC for CVE-2022-46169",
"fork": false,
"created_at": "2023-01-16T10:21:26Z",
"updated_at": "2023-06-05T10:15:44Z",
"updated_at": "2023-10-08T20:21:44Z",
"pushed_at": "2023-01-17T16:32:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -247,7 +247,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence",
"fork": false,
"created_at": "2023-10-06T20:29:44Z",
"updated_at": "2023-10-08T17:48:30Z",
"updated_at": "2023-10-08T22:08:31Z",
"pushed_at": "2023-10-06T21:59:30Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 22,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -78,10 +78,10 @@
"description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0",
"fork": false,
"created_at": "2023-09-17T23:17:22Z",
"updated_at": "2023-09-30T09:09:12Z",
"updated_at": "2023-10-08T19:25:44Z",
"pushed_at": "2023-09-17T23:38:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2023-10-08T13:47:43Z",
"updated_at": "2023-10-08T22:15:14Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 151,
"watchers": 152,
"score": 0,
"subscribers_count": 2
},
@ -50,10 +50,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-30T23:17:04Z",
"updated_at": "2023-10-06T08:23:36Z",
"updated_at": "2023-10-08T22:07:44Z",
"pushed_at": "2023-10-01T06:23:28Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2023-10-08T16:21:52Z",
"updated_at": "2023-10-08T18:30:32Z",
"pushed_at": "2023-09-26T09:49:37Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -103,10 +103,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false,
"created_at": "2023-06-18T15:42:00Z",
"updated_at": "2023-09-08T18:54:50Z",
"updated_at": "2023-10-08T18:46:33Z",
"pushed_at": "2023-06-19T04:42:56Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -50,7 +50,7 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -75,7 +75,7 @@
"web-application-security"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 18,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-10-08T16:09:29Z",
"updated_at": "2023-10-08T19:40:26Z",
"pushed_at": "2023-09-17T02:17:52Z",
"stargazers_count": 669,
"watchers_count": 669,
"stargazers_count": 670,
"watchers_count": 670,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 118,
"watchers": 669,
"watchers": 670,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "A small write-up with examples to understand CVE-2023-43115",
"fork": false,
"created_at": "2023-09-28T17:30:06Z",
"updated_at": "2023-10-08T08:41:46Z",
"updated_at": "2023-10-08T18:38:34Z",
"pushed_at": "2023-09-29T18:21:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2023-10-08T17:44:16Z",
"updated_at": "2023-10-08T21:46:54Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 274,
"watchers": 275,
"score": 0,
"subscribers_count": 2
},
@ -73,19 +73,19 @@
"description": "CVE-2023-4911 proof of concept",
"fork": false,
"created_at": "2023-10-04T14:32:49Z",
"updated_at": "2023-10-08T17:00:23Z",
"pushed_at": "2023-10-04T16:54:54Z",
"stargazers_count": 106,
"watchers_count": 106,
"updated_at": "2023-10-08T23:47:57Z",
"pushed_at": "2023-10-08T23:24:24Z",
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 106,
"forks": 19,
"watchers": 108,
"score": 0,
"subscribers_count": 3
},

View file

@ -35555,6 +35555,13 @@
- [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit)
### CVE-2005-3299 (2005-10-23)
<code>PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
</code>
- [RizeKishimaro/CVE-2005-3299](https://github.com/RizeKishimaro/CVE-2005-3299)
## 2004
### CVE-2004-0558 (2004-09-17)