Auto Update 2023/12/30 06:26:05

This commit is contained in:
motikan2010-bot 2023-12-30 15:26:05 +09:00
parent a072bba3f6
commit a33661459a
33 changed files with 128 additions and 559 deletions

View file

@ -1,32 +0,0 @@
[
{
"id": 50957830,
"name": "cve-2016-0701",
"full_name": "luanjampa\/cve-2016-0701",
"owner": {
"login": "luanjampa",
"id": 4728927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4728927?v=4",
"html_url": "https:\/\/github.com\/luanjampa"
},
"html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701",
"description": null,
"fork": false,
"created_at": "2016-02-02T22:53:34Z",
"updated_at": "2016-02-15T06:03:46Z",
"pushed_at": "2016-02-24T17:32:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -119,36 +119,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 50619014,
"name": "cve-2016-0728-testbed",
"full_name": "neuschaefer\/cve-2016-0728-testbed",
"owner": {
"login": "neuschaefer",
"id": 1021512,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1021512?v=4",
"html_url": "https:\/\/github.com\/neuschaefer"
},
"html_url": "https:\/\/github.com\/neuschaefer\/cve-2016-0728-testbed",
"description": "A testbed for CVE-2016-0728, a refcount leak\/overflow bug in Linux",
"fork": false,
"created_at": "2016-01-28T22:38:13Z",
"updated_at": "2023-02-16T19:24:26Z",
"pushed_at": "2016-01-29T00:48:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 4
},
{
"id": 53915696,
"name": "cve-2016-0728",

View file

@ -28,35 +28,5 @@
"watchers": 38,
"score": 0,
"subscribers_count": 5
},
{
"id": 56596683,
"name": "CVE-2016-0846-PoC",
"full_name": "b0b0505\/CVE-2016-0846-PoC",
"owner": {
"login": "b0b0505",
"id": 6748041,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6748041?v=4",
"html_url": "https:\/\/github.com\/b0b0505"
},
"html_url": "https:\/\/github.com\/b0b0505\/CVE-2016-0846-PoC",
"description": null,
"fork": false,
"created_at": "2016-04-19T12:56:44Z",
"updated_at": "2016-04-27T18:05:22Z",
"pushed_at": "2016-04-19T13:01:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 56461631,
"name": "cfengine-CVE-2016-2118",
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
"description": "An example detection and remediation policy.",
"fork": false,
"created_at": "2016-04-17T22:22:04Z",
"updated_at": "2016-04-18T02:57:44Z",
"pushed_at": "2016-04-19T14:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 56758577,
"name": "CVE-2016-3141",
"full_name": "peternguyen93\/CVE-2016-3141",
"owner": {
"login": "peternguyen93",
"id": 1802870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
"html_url": "https:\/\/github.com\/peternguyen93"
},
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
"description": "CVE-2016-3141",
"fork": false,
"created_at": "2016-04-21T08:59:05Z",
"updated_at": "2023-03-11T18:41:15Z",
"pushed_at": "2016-04-23T15:55:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -88,5 +88,35 @@
"watchers": 23,
"score": 0,
"subscribers_count": 1
},
{
"id": 734562621,
"name": "CVE-2016-4437",
"full_name": "pizza-power\/CVE-2016-4437",
"owner": {
"login": "pizza-power",
"id": 6135659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
"html_url": "https:\/\/github.com\/pizza-power"
},
"html_url": "https:\/\/github.com\/pizza-power\/CVE-2016-4437",
"description": "Python POC to Exploit CVE-2016-4437 Apache Shiro Deserialization Vulnerability Due to Hardcode Encryption Key",
"fork": false,
"created_at": "2023-12-22T02:26:01Z",
"updated_at": "2023-12-30T02:29:10Z",
"pushed_at": "2023-12-30T02:30:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-12-29T09:10:06Z",
"updated_at": "2023-12-30T03:41:29Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 787,
"watchers_count": 787,
"stargazers_count": 788,
"watchers_count": 788,
"has_discussions": false,
"forks_count": 436,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 436,
"watchers": 787,
"watchers": 788,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "Jquery File Tree 1.6.6 Path Traversal exploit (CVE-2017-1000170)",
"fork": false,
"created_at": "2021-03-19T12:39:10Z",
"updated_at": "2023-05-16T18:47:07Z",
"updated_at": "2023-12-30T03:34:28Z",
"pushed_at": "2021-05-04T18:21:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-12-29T16:49:30Z",
"updated_at": "2023-12-30T05:44:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3966,
"watchers_count": 3966,
"stargazers_count": 3967,
"watchers_count": 3967,
"has_discussions": false,
"forks_count": 1094,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1094,
"watchers": 3966,
"watchers": 3967,
"score": 0,
"subscribers_count": 155
},

View file

@ -103,19 +103,19 @@
"description": "TelerikUI Vulnerability Scanner (CVE-2019-18935)",
"fork": false,
"created_at": "2020-05-25T08:37:51Z",
"updated_at": "2023-10-28T10:33:02Z",
"updated_at": "2023-12-30T03:47:40Z",
"pushed_at": "2023-05-10T02:17:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"forks": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-12-29T16:49:30Z",
"updated_at": "2023-12-30T05:44:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3966,
"watchers_count": 3966,
"stargazers_count": 3967,
"watchers_count": 3967,
"has_discussions": false,
"forks_count": 1094,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1094,
"watchers": 3966,
"watchers": 3967,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,10 +13,10 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2023-12-20T07:38:09Z",
"updated_at": "2023-12-30T03:49:09Z",
"pushed_at": "2023-08-15T17:57:06Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 6
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 1766,
"watchers_count": 1766,
"has_discussions": false,
"forks_count": 586,
"forks_count": 585,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 586,
"forks": 585,
"watchers": 1766,
"score": 0,
"subscribers_count": 44

View file

@ -138,13 +138,13 @@
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 18,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 17,
"watchers": 66,
"score": 0,
"subscribers_count": 6

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414051484,
"name": "cve-2021-24499",
"full_name": "hh-hunter\/cve-2021-24499",
"owner": {
"login": "hh-hunter",
"id": 91593280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
"html_url": "https:\/\/github.com\/hh-hunter"
},
"html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
"description": null,
"fork": false,
"created_at": "2021-10-06T03:07:31Z",
"updated_at": "2021-10-06T03:45:29Z",
"pushed_at": "2021-10-06T03:44:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 698068217,
"name": "CVE-2021-24499",

View file

@ -58,39 +58,5 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 414009465,
"name": "CVE-2021-27651",
"full_name": "orangmuda\/CVE-2021-27651",
"owner": {
"login": "orangmuda",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/orangmuda"
},
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
"description": "bypass all stages of the password reset flow",
"fork": false,
"created_at": "2021-10-05T23:33:50Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-05T23:35:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"code-injection",
"pega",
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -193,10 +193,10 @@
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-06-29T12:37:31Z",
"updated_at": "2023-12-13T16:01:00Z",
"updated_at": "2023-12-30T05:14:10Z",
"pushed_at": "2022-06-30T08:36:58Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 2
},

View file

@ -29,66 +29,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413892415,
"name": "CVE-2021-41773",
"full_name": "numanturle\/CVE-2021-41773",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-05T16:18:09Z",
"updated_at": "2023-12-08T12:43:35Z",
"pushed_at": "2021-10-05T16:48:27Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},
{
"id": 413901787,
"name": "CVE-2021-41773",
"full_name": "knqyf263\/CVE-2021-41773",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
"fork": false,
"created_at": "2021-10-05T16:45:41Z",
"updated_at": "2023-12-08T12:43:35Z",
"pushed_at": "2021-10-06T05:40:34Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 3
},
{
"id": 413916578,
"name": "CVE-2021-41773-PoC",
@ -155,96 +95,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413943505,
"name": "CVE-2021-41773",
"full_name": "masahiro331\/CVE-2021-41773",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T18:56:04Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-06T03:43:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 413969845,
"name": "CVE-2021-41773",
"full_name": "j4k0m\/CVE-2021-41773",
"owner": {
"login": "j4k0m",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/j4k0m"
},
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T20:30:01Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T22:06:50Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 413972926,
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
"description": "Poc.py ",
"fork": false,
"created_at": "2021-10-05T20:41:34Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 414013246,
"name": "CVE-2021-41773-PoC",
@ -342,36 +192,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414050354,
"name": "CVE-2021-41773-PoC",
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
"owner": {
"login": "habibiefaried",
"id": 4345690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
"html_url": "https:\/\/github.com\/habibiefaried"
},
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"fork": false,
"created_at": "2021-10-06T03:01:41Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-06T05:39:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
@ -402,36 +222,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414082633,
"name": "cve-2021-41773-nse",
"full_name": "TAI-REx\/cve-2021-41773-nse",
"owner": {
"login": "TAI-REx",
"id": 78527947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
"html_url": "https:\/\/github.com\/TAI-REx"
},
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:36:22Z",
"updated_at": "2021-11-26T18:07:10Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",

View file

@ -912,7 +912,7 @@
"stargazers_count": 1676,
"watchers_count": 1676,
"has_discussions": false,
"forks_count": 494,
"forks_count": 495,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,7 +923,7 @@
"security"
],
"visibility": "public",
"forks": 494,
"forks": 495,
"watchers": 1676,
"score": 0,
"subscribers_count": 26
@ -3703,19 +3703,19 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-12-29T05:43:18Z",
"updated_at": "2023-12-30T02:39:35Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3323,
"watchers_count": 3323,
"stargazers_count": 3322,
"watchers_count": 3322,
"has_discussions": true,
"forks_count": 750,
"forks_count": 751,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 750,
"watchers": 3323,
"forks": 751,
"watchers": 3322,
"score": 0,
"subscribers_count": 58
},

View file

@ -2777,6 +2777,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2003,6 +2003,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
"fork": false,
"created_at": "2023-01-09T04:27:15Z",
"updated_at": "2023-12-27T09:58:57Z",
"updated_at": "2023-12-30T03:03:49Z",
"pushed_at": "2023-01-09T08:19:27Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 4
}

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).",
"fork": false,
"created_at": "2023-03-08T06:20:45Z",
"updated_at": "2023-09-16T13:54:07Z",
"updated_at": "2023-12-30T02:10:18Z",
"pushed_at": "2023-03-08T06:21:58Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 4
},

View file

@ -1261,6 +1261,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -437,6 +437,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -50,7 +50,7 @@
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -75,7 +75,7 @@
"web-application-security"
],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 39,
"score": 0,
"subscribers_count": 2

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2023-12-27T10:01:29Z",
"updated_at": "2023-12-30T02:40:58Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 217,
"watchers_count": 217,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 216,
"watchers": 217,
"score": 0,
"subscribers_count": 5
},

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-12-14T23:58:42Z",
"updated_at": "2023-12-24T18:50:17Z",
"pushed_at": "2023-12-27T23:41:09Z",
"pushed_at": "2023-12-30T02:02:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -209,36 +209,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 736713584,
"name": "CVE-2023-51385_test-star-main",
"full_name": "siyi-star\/CVE-2023-51385_test-star-main",
"owner": {
"login": "siyi-star",
"id": 60383315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60383315?v=4",
"html_url": "https:\/\/github.com\/siyi-star"
},
"html_url": "https:\/\/github.com\/siyi-star\/CVE-2023-51385_test-star-main",
"description": "CVE-2023-51385_test-star-main",
"fork": false,
"created_at": "2023-12-28T16:56:13Z",
"updated_at": "2023-12-28T16:56:13Z",
"pushed_at": "2023-12-28T17:40:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 736832290,
"name": "CVE-2023-51385_TT",
@ -267,6 +237,36 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 737146570,
"name": "CVE-2023-51385_test",
"full_name": "power1314520\/CVE-2023-51385_test",
"owner": {
"login": "power1314520",
"id": 37863351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37863351?v=4",
"html_url": "https:\/\/github.com\/power1314520"
},
"html_url": "https:\/\/github.com\/power1314520\/CVE-2023-51385_test",
"description": "一个验证对CVE-2023-51385",
"fork": false,
"created_at": "2023-12-30T01:08:29Z",
"updated_at": "2023-12-30T01:08:29Z",
"pushed_at": "2023-12-30T01:13:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,7 +27,7 @@
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 737019244,
@ -73,7 +73,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 737064466,
@ -103,6 +103,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -6044,8 +6044,8 @@
- [zls1793/CVE-2023-51385_test](https://github.com/zls1793/CVE-2023-51385_test)
- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
- [zhulin2/testCVE-2023-51385](https://github.com/zhulin2/testCVE-2023-51385)
- [siyi-star/CVE-2023-51385_test-star-main](https://github.com/siyi-star/CVE-2023-51385_test-star-main)
- [N0rther/CVE-2023-51385_TT](https://github.com/N0rther/CVE-2023-51385_TT)
- [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test)
### CVE-2023-51467 (2023-12-26)
@ -14502,7 +14502,6 @@
</code>
- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
### CVE-2021-24507 (2021-08-09)
@ -15100,7 +15099,6 @@
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
### CVE-2021-27850 (2021-04-15)
@ -17233,19 +17231,12 @@
</code>
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
@ -33779,13 +33770,6 @@
- [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln)
- [BabyTeam1024/CVE-2016-0638](https://github.com/BabyTeam1024/CVE-2016-0638)
### CVE-2016-0701 (2016-02-14)
<code>The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
</code>
- [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701)
### CVE-2016-0702 (2016-03-03)
<code>The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a &quot;CacheBleed&quot; attack.
@ -33802,7 +33786,6 @@
- [kennetham/cve_2016_0728](https://github.com/kennetham/cve_2016_0728)
- [nardholio/cve-2016-0728](https://github.com/nardholio/cve-2016-0728)
- [googleweb/CVE-2016-0728](https://github.com/googleweb/CVE-2016-0728)
- [neuschaefer/cve-2016-0728-testbed](https://github.com/neuschaefer/cve-2016-0728-testbed)
- [bittorrent3389/cve-2016-0728](https://github.com/bittorrent3389/cve-2016-0728)
- [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728)
- [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728)
@ -33863,7 +33846,6 @@
</code>
- [secmob/CVE-2016-0846](https://github.com/secmob/CVE-2016-0846)
- [b0b0505/CVE-2016-0846-PoC](https://github.com/b0b0505/CVE-2016-0846-PoC)
### CVE-2016-0974 (2016-02-10)
@ -33994,13 +33976,6 @@
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
### CVE-2016-2118 (2016-04-12)
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka &quot;BADLOCK.&quot;
</code>
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
### CVE-2016-2173 (2017-04-21)
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
@ -34122,13 +34097,6 @@
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
### CVE-2016-3141 (2016-03-31)
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
</code>
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
### CVE-2016-3238 (2016-07-12)
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka &quot;Windows Print Spooler Remote Code Execution Vulnerability.&quot;
@ -34249,6 +34217,7 @@
- [bkfish/Awesome_shiro](https://github.com/bkfish/Awesome_shiro)
- [m3terpreter/CVE-2016-4437](https://github.com/m3terpreter/CVE-2016-4437)
- [4nth0ny1130/shisoserial](https://github.com/4nth0ny1130/shisoserial)
- [pizza-power/CVE-2016-4437](https://github.com/pizza-power/CVE-2016-4437)
### CVE-2016-4438 (2016-07-04)