Auto Update 2023/03/19 12:32:04

This commit is contained in:
motikan2010-bot 2023-03-19 21:32:04 +09:00
parent d28b41bccc
commit 9b613525e8
34 changed files with 220 additions and 130 deletions

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-17T08:08:02Z",
"updated_at": "2023-03-19T10:43:27Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1642,
"watchers_count": 1642,
"stargazers_count": 1643,
"watchers_count": 1643,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1642,
"watchers": 1643,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-17T08:08:02Z",
"updated_at": "2023-03-19T10:43:27Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1642,
"watchers_count": 1642,
"stargazers_count": 1643,
"watchers_count": 1643,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1642,
"watchers": 1643,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-17T08:08:02Z",
"updated_at": "2023-03-19T10:43:27Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1642,
"watchers_count": 1642,
"stargazers_count": 1643,
"watchers_count": 1643,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1642,
"watchers": 1643,
"score": 0
},
{

View file

@ -77,10 +77,10 @@
"description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
"fork": false,
"created_at": "2019-05-11T12:11:05Z",
"updated_at": "2023-03-11T14:31:06Z",
"updated_at": "2023-03-19T08:41:46Z",
"pushed_at": "2021-10-22T16:05:33Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2023-03-08T09:30:11Z",
"updated_at": "2023-03-19T11:31:46Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 475,
"watchers_count": 475,
"stargazers_count": 477,
"watchers_count": 477,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 475,
"watchers": 477,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Joomla!, Second Order SQL Injection",
"fork": false,
"created_at": "2018-02-12T05:02:52Z",
"updated_at": "2018-10-04T17:23:42Z",
"updated_at": "2023-03-19T07:44:34Z",
"pushed_at": "2018-02-12T12:14:40Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -42,10 +42,10 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2023-02-04T13:29:09Z",
"updated_at": "2023-03-19T07:59:19Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 125,
"watchers": 126,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-17T08:08:02Z",
"updated_at": "2023-03-19T10:43:27Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1642,
"watchers_count": 1642,
"stargazers_count": 1643,
"watchers_count": 1643,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1642,
"watchers": 1643,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
"fork": false,
"created_at": "2020-11-10T13:08:21Z",
"updated_at": "2023-03-01T04:16:33Z",
"updated_at": "2023-03-19T10:17:07Z",
"pushed_at": "2021-02-14T15:08:01Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 35,
"watchers": 36,
"score": 0
}
]

View file

@ -165,10 +165,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2023-03-16T22:40:21Z",
"updated_at": "2023-03-19T11:58:04Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 522,
"watchers_count": 522,
"stargazers_count": 523,
"watchers_count": 523,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -177,7 +177,7 @@
"topics": [],
"visibility": "public",
"forks": 141,
"watchers": 522,
"watchers": 523,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-17T08:08:02Z",
"updated_at": "2023-03-19T10:43:27Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1642,
"watchers_count": 1642,
"stargazers_count": 1643,
"watchers_count": 1643,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1642,
"watchers": 1643,
"score": 0
},
{

View file

@ -81,13 +81,13 @@
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 33,
"score": 0
},

View file

@ -77,10 +77,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-03-18T18:36:52Z",
"updated_at": "2023-03-19T10:33:22Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1766,
"watchers_count": 1766,
"stargazers_count": 1767,
"watchers_count": 1767,
"has_discussions": false,
"forks_count": 505,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 505,
"watchers": 1766,
"watchers": 1767,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2023-03-14T14:38:39Z",
"updated_at": "2023-03-19T11:17:05Z",
"pushed_at": "2023-01-01T21:12:20Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -5156,10 +5156,10 @@
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
"fork": false,
"created_at": "2021-12-13T21:47:41Z",
"updated_at": "2023-03-09T09:24:17Z",
"updated_at": "2023-03-19T07:59:48Z",
"pushed_at": "2022-12-27T20:59:51Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -5176,7 +5176,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 68,
"watchers": 69,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2023-03-13T15:04:56Z",
"updated_at": "2023-03-19T11:58:01Z",
"pushed_at": "2022-09-04T17:28:56Z",
"stargazers_count": 313,
"watchers_count": 313,

View file

@ -206,5 +206,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 616018302,
"name": "Bash-exploit-for-CVE-2022-0739",
"full_name": "luxel-h\/Bash-exploit-for-CVE-2022-0739",
"owner": {
"login": "luxel-h",
"id": 125658579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125658579?v=4",
"html_url": "https:\/\/github.com\/luxel-h"
},
"html_url": "https:\/\/github.com\/luxel-h\/Bash-exploit-for-CVE-2022-0739",
"description": null,
"fork": false,
"created_at": "2023-03-19T11:35:03Z",
"updated_at": "2023-03-19T11:53:50Z",
"pushed_at": "2023-03-19T11:52:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2023-03-17T07:07:00Z",
"updated_at": "2023-03-19T07:40:28Z",
"pushed_at": "2023-01-10T16:25:49Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 177,
"watchers": 178,
"score": 0
}
]

View file

@ -56,5 +56,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 615996454,
"name": "CVE-2022-23773-Reproduce",
"full_name": "Liuyushung\/CVE-2022-23773-Reproduce",
"owner": {
"login": "Liuyushung",
"id": 51371214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51371214?v=4",
"html_url": "https:\/\/github.com\/Liuyushung"
},
"html_url": "https:\/\/github.com\/Liuyushung\/CVE-2022-23773-Reproduce",
"description": null,
"fork": false,
"created_at": "2023-03-19T10:08:47Z",
"updated_at": "2023-03-19T10:12:25Z",
"pushed_at": "2023-03-19T11:57:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2023-03-14T21:03:40Z",
"updated_at": "2023-03-19T12:02:56Z",
"pushed_at": "2023-03-04T05:52:28Z",
"stargazers_count": 418,
"watchers_count": 418,
"stargazers_count": 419,
"watchers_count": 419,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 418,
"watchers": 419,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2023-03-08T18:09:28Z",
"updated_at": "2023-03-19T09:55:07Z",
"pushed_at": "2022-08-30T13:23:51Z",
"stargazers_count": 253,
"watchers_count": 253,
"stargazers_count": 254,
"watchers_count": 254,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 253,
"watchers": 254,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 34,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 35,
"watchers": 131,
"score": 0
},

View file

@ -158,10 +158,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2023-03-17T14:35:51Z",
"updated_at": "2023-03-19T08:31:56Z",
"pushed_at": "2022-09-15T03:19:28Z",
"stargazers_count": 199,
"watchers_count": 199,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 199,
"watchers": 200,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
"updated_at": "2023-02-27T03:17:02Z",
"updated_at": "2023-03-19T12:09:44Z",
"pushed_at": "2022-12-05T23:36:42Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 140,
"watchers": 141,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 31,
"watchers": 214,
"score": 0
},
@ -195,13 +195,13 @@
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 114,
"score": 0
},

View file

@ -378,10 +378,10 @@
"description": "Example of CVE-2022-46689 aka MacDirtyCow.",
"fork": false,
"created_at": "2023-03-01T08:23:49Z",
"updated_at": "2023-03-18T11:28:54Z",
"updated_at": "2023-03-19T10:34:06Z",
"pushed_at": "2023-03-01T08:25:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -397,7 +397,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Analyzing and Reproducing the Command Injection Vulnerability (CVE-2023-0861) in NetModule Routers",
"fork": false,
"created_at": "2023-03-12T17:43:00Z",
"updated_at": "2023-03-18T17:22:37Z",
"updated_at": "2023-03-19T11:04:34Z",
"pushed_at": "2023-03-16T19:17:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Discord bot which monitors for and deletes images vulnerable to the Acropalypse exploit (CVE-2023-21036)",
"fork": false,
"created_at": "2023-03-19T02:15:23Z",
"updated_at": "2023-03-19T05:21:46Z",
"updated_at": "2023-03-19T07:34:00Z",
"pushed_at": "2023-03-19T05:21:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-01-30T12:57:48Z",
"updated_at": "2023-03-16T15:50:50Z",
"updated_at": "2023-03-19T12:17:46Z",
"pushed_at": "2023-02-27T04:51:20Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 41,
"watchers": 183,
"watchers": 184,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 306,
"watchers_count": 306,
"has_discussions": false,
"forks_count": 113,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 113,
"forks": 114,
"watchers": 306,
"score": 0
},
@ -71,12 +71,12 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2023-03-19T01:51:36Z",
"updated_at": "2023-03-19T07:30:27Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -90,8 +90,8 @@
"windows"
],
"visibility": "public",
"forks": 26,
"watchers": 90,
"forks": 27,
"watchers": 91,
"score": 0
},
{
@ -113,13 +113,13 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 10,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-03-18T22:39:44Z",
"updated_at": "2023-03-19T11:45:58Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 115,
"watchers": 116,
"score": 0
},
{
@ -129,10 +129,10 @@
"description": "Simple PoC in PowerShell for CVE-2023-23397",
"fork": false,
"created_at": "2023-03-16T19:10:37Z",
"updated_at": "2023-03-18T14:34:33Z",
"updated_at": "2023-03-19T11:45:46Z",
"pushed_at": "2023-03-16T19:29:49Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -151,7 +151,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 11,
"score": 0
},
{
@ -168,10 +168,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-03-19T03:55:03Z",
"updated_at": "2023-03-19T11:46:11Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 179,
"watchers_count": 179,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 173,
"watchers": 179,
"score": 0
},
{
@ -327,5 +327,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 615967703,
"name": "CVE-2023-23397-POC-Using-Interop-Outlook",
"full_name": "ahmedkhlief\/CVE-2023-23397-POC-Using-Interop-Outlook",
"owner": {
"login": "ahmedkhlief",
"id": 24752712,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24752712?v=4",
"html_url": "https:\/\/github.com\/ahmedkhlief"
},
"html_url": "https:\/\/github.com\/ahmedkhlief\/CVE-2023-23397-POC-Using-Interop-Outlook",
"description": null,
"fork": false,
"created_at": "2023-03-19T08:07:58Z",
"updated_at": "2023-03-19T10:18:31Z",
"pushed_at": "2023-03-19T08:10:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-23415",
"fork": false,
"created_at": "2023-03-17T12:38:30Z",
"updated_at": "2023-03-19T04:43:02Z",
"updated_at": "2023-03-19T12:08:40Z",
"pushed_at": "2023-03-17T12:45:04Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 16,
"forks": 4,
"watchers": 28,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2023-03-18T15:07:54Z",
"updated_at": "2023-03-19T11:12:46Z",
"pushed_at": "2023-03-07T10:43:36Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 83,
"watchers": 85,
"score": 0
}
]

View file

@ -264,6 +264,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability
- [ahmedkhlief/CVE-2023-23397-POC](https://github.com/ahmedkhlief/CVE-2023-23397-POC)
- [BillSkiCO/CVE-2023-23397_EXPLOIT](https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT)
- [djackreuter/CVE-2023-23397-PoC](https://github.com/djackreuter/CVE-2023-23397-PoC)
- [ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook](https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook)
### CVE-2023-23415 (2023-03-14)
@ -572,6 +573,7 @@ The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user
- [Ki11i0n4ir3/CVE-2022-0739](https://github.com/Ki11i0n4ir3/CVE-2022-0739)
- [viardant/CVE-2022-0739](https://github.com/viardant/CVE-2022-0739)
- [ElGanz0/CVE-2022-0739](https://github.com/ElGanz0/CVE-2022-0739)
- [luxel-h/Bash-exploit-for-CVE-2022-0739](https://github.com/luxel-h/Bash-exploit-for-CVE-2022-0739)
### CVE-2022-0778 (2022-03-15)
@ -2359,6 +2361,7 @@ cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch nam
- [danbudris/CVE-2022-23773-repro](https://github.com/danbudris/CVE-2022-23773-repro)
- [danbudris/CVE-2022-23773-repro-target](https://github.com/danbudris/CVE-2022-23773-repro-target)
- [Liuyushung/CVE-2022-23773-Reproduce](https://github.com/Liuyushung/CVE-2022-23773-Reproduce)
### CVE-2022-23779 (2022-03-02)