Auto Update 2023/09/12 18:51:52

This commit is contained in:
motikan2010-bot 2023-09-13 03:51:52 +09:00
parent c545d1bcc6
commit a7f7666962
27 changed files with 514 additions and 81 deletions

View file

@ -62,6 +62,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/c0r0n3r"
},
"html_url": "https:\/\/github.com\/c0r0n3r\/dheater",
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2023-09-08T18:26:00Z",
"pushed_at": "2023-05-07T11:39:29Z",
"updated_at": "2023-09-12T16:39:15Z",
"pushed_at": "2023-09-12T16:52:26Z",
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,

32
2016/CVE-2016-7200.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 78062082,
"name": "chakra-2016-11",
"full_name": "theori-io\/chakra-2016-11",
"owner": {
"login": "theori-io",
"id": 18063559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18063559?v=4",
"html_url": "https:\/\/github.com\/theori-io"
},
"html_url": "https:\/\/github.com\/theori-io\/chakra-2016-11",
"description": "Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)",
"fork": false,
"created_at": "2017-01-04T23:41:27Z",
"updated_at": "2023-09-07T16:47:11Z",
"pushed_at": "2017-01-04T23:42:46Z",
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 139,
"score": 0,
"subscribers_count": 17
}
]

View file

@ -57,7 +57,7 @@
"forks": 8,
"watchers": 11,
"score": 0,
"subscribers_count": 2
"subscribers_count": 0
},
{
"id": 106053959,

View file

@ -13,10 +13,10 @@
"description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false,
"created_at": "2020-04-27T11:49:40Z",
"updated_at": "2023-09-05T16:42:05Z",
"updated_at": "2023-09-12T13:47:08Z",
"pushed_at": "2023-05-22T23:24:36Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 3
},

32
2018/CVE-2018-0952.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 145615979,
"name": "CVE-2018-0952-SystemCollector",
"full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
"owner": {
"login": "atredispartners",
"id": 7254370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4",
"html_url": "https:\/\/github.com\/atredispartners"
},
"html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
"fork": false,
"created_at": "2018-08-21T20:29:10Z",
"updated_at": "2023-09-10T08:29:58Z",
"pushed_at": "2018-08-21T20:30:24Z",
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 107,
"score": 0,
"subscribers_count": 7
}
]

View file

@ -28,5 +28,35 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 145526091,
"name": "cve-2018-9948-9958-exp",
"full_name": "orangepirate\/cve-2018-9948-9958-exp",
"owner": {
"login": "orangepirate",
"id": 40813235,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40813235?v=4",
"html_url": "https:\/\/github.com\/orangepirate"
},
"html_url": "https:\/\/github.com\/orangepirate\/cve-2018-9948-9958-exp",
"description": "a exp for cve-2018-9948\/9958 , current shellcode called win-calc ",
"fork": false,
"created_at": "2018-08-21T07:43:38Z",
"updated_at": "2018-08-24T00:18:07Z",
"pushed_at": "2018-08-24T00:18:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -217,6 +217,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 233274912,
"name": "Citrix_CVE-2019-19781",
"full_name": "becrevex\/Citrix_CVE-2019-19781",
"owner": {
"login": "becrevex",
"id": 8326868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4",
"html_url": "https:\/\/github.com\/becrevex"
},
"html_url": "https:\/\/github.com\/becrevex\/Citrix_CVE-2019-19781",
"description": "Took at stab at an NSE discovery script for CVE-2019-19781.",
"fork": false,
"created_at": "2020-01-11T18:04:17Z",
"updated_at": "2022-06-27T14:55:57Z",
"pushed_at": "2020-01-11T19:48:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 233294562,
"name": "Exploits_CVE-2019-19781",

View file

@ -980,10 +980,10 @@
"description": "POC for checking multiple hosts for Zerologon vulnerability",
"fork": false,
"created_at": "2020-09-29T18:45:44Z",
"updated_at": "2023-06-04T11:52:31Z",
"updated_at": "2023-09-12T14:11:48Z",
"pushed_at": "2020-10-05T07:47:02Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -992,7 +992,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 690703239,
"name": "Detection-and-Mitigation-for-CVE-2022-1679",
"full_name": "ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
"owner": {
"login": "ov3rwatch",
"id": 23441286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23441286?v=4",
"html_url": "https:\/\/github.com\/ov3rwatch"
},
"html_url": "https:\/\/github.com\/ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
"description": null,
"fork": false,
"created_at": "2023-09-12T17:47:01Z",
"updated_at": "2023-09-12T17:48:39Z",
"pushed_at": "2023-09-12T17:48:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2355,36 +2355,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 588668068,
"name": "Follina_Vagrant",
"full_name": "3barz\/Follina_Vagrant",
"owner": {
"login": "3barz",
"id": 113859310,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113859310?v=4",
"html_url": "https:\/\/github.com\/3barz"
},
"html_url": "https:\/\/github.com\/3barz\/Follina_Vagrant",
"description": "Follina(CVE-2022-30190) Vagrant Demo",
"fork": false,
"created_at": "2023-01-13T17:32:13Z",
"updated_at": "2023-01-13T17:36:25Z",
"pushed_at": "2023-01-13T17:36:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 601379517,
"name": "CVE-2022-30190",

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-34265 (Django)",
"fork": false,
"created_at": "2022-07-07T07:45:28Z",
"updated_at": "2023-08-30T09:42:45Z",
"updated_at": "2023-09-12T15:37:08Z",
"pushed_at": "2022-07-30T07:53:43Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 118,
"watchers": 119,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
"fork": false,
"created_at": "2023-01-17T21:26:28Z",
"updated_at": "2023-08-24T20:45:31Z",
"updated_at": "2023-09-12T15:26:04Z",
"pushed_at": "2023-01-19T13:10:07Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 5
},

View file

@ -1,4 +1,94 @@
[
{
"id": 661072883,
"name": "CVE-2023-24488-PoC",
"full_name": "SirBugs\/CVE-2023-24488-PoC",
"owner": {
"login": "SirBugs",
"id": 37689994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37689994?v=4",
"html_url": "https:\/\/github.com\/SirBugs"
},
"html_url": "https:\/\/github.com\/SirBugs\/CVE-2023-24488-PoC",
"description": "CVE-2023-24488 PoC",
"fork": false,
"created_at": "2023-07-01T17:47:17Z",
"updated_at": "2023-07-24T21:45:44Z",
"pushed_at": "2023-07-01T17:49:16Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 661909414,
"name": "CVE-2023-24488",
"full_name": "Abo5\/CVE-2023-24488",
"owner": {
"login": "Abo5",
"id": 40110835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
"html_url": "https:\/\/github.com\/Abo5"
},
"html_url": "https:\/\/github.com\/Abo5\/CVE-2023-24488",
"description": "CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.",
"fork": false,
"created_at": "2023-07-04T00:29:56Z",
"updated_at": "2023-07-22T18:29:56Z",
"pushed_at": "2023-07-04T00:40:46Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 662260047,
"name": "CVE-2023-24488",
"full_name": "securitycipher\/CVE-2023-24488",
"owner": {
"login": "securitycipher",
"id": 111536600,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111536600?v=4",
"html_url": "https:\/\/github.com\/securitycipher"
},
"html_url": "https:\/\/github.com\/securitycipher\/CVE-2023-24488",
"description": "POC for CVE-2023-24488",
"fork": false,
"created_at": "2023-07-04T18:02:50Z",
"updated_at": "2023-07-19T18:59:08Z",
"pushed_at": "2023-07-04T18:39:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 662853030,
"name": "cve-2023-24488",

View file

@ -58,5 +58,35 @@
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 661672662,
"name": "CVE-2023-28343",
"full_name": "hba343434\/CVE-2023-28343",
"owner": {
"login": "hba343434",
"id": 120598843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120598843?v=4",
"html_url": "https:\/\/github.com\/hba343434"
},
"html_url": "https:\/\/github.com\/hba343434\/CVE-2023-28343",
"description": "CVE-2023-28343",
"fork": false,
"created_at": "2023-07-03T11:48:21Z",
"updated_at": "2023-07-06T15:42:44Z",
"pushed_at": "2023-07-03T11:50:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3124 PoC",
"fork": false,
"created_at": "2023-09-05T12:32:50Z",
"updated_at": "2023-09-05T12:41:27Z",
"updated_at": "2023-09-12T16:31:05Z",
"pushed_at": "2023-09-05T15:58:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
"fork": false,
"created_at": "2023-05-16T03:06:40Z",
"updated_at": "2023-09-12T09:18:12Z",
"updated_at": "2023-09-12T15:22:37Z",
"pushed_at": "2023-05-16T04:34:16Z",
"stargazers_count": 325,
"watchers_count": 325,
"stargazers_count": 326,
"watchers_count": 326,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 325,
"watchers": 326,
"score": 0,
"subscribers_count": 4
},

View file

@ -243,6 +243,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 661522187,
"name": "WP-CVE-2023-32243",
"full_name": "Jenderal92\/WP-CVE-2023-32243",
"owner": {
"login": "Jenderal92",
"id": 59664965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
"html_url": "https:\/\/github.com\/Jenderal92"
},
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-32243",
"description": "Python 2.7",
"fork": false,
"created_at": "2023-07-03T04:16:16Z",
"updated_at": "2023-07-24T14:30:30Z",
"pushed_at": "2023-07-03T04:17:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 672367254,
"name": "Mass-CVE-2023-32243",

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-09-12T02:10:03Z",
"updated_at": "2023-09-12T15:01:18Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 415,
"watchers_count": 415,
"stargazers_count": 416,
"watchers_count": 416,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 415,
"watchers": 416,
"score": 0,
"subscribers_count": 16
}

View file

@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 661661784,
"name": "CHAMILO-CVE-2023-34960",
"full_name": "Jenderal92\/CHAMILO-CVE-2023-34960",
"owner": {
"login": "Jenderal92",
"id": 59664965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
"html_url": "https:\/\/github.com\/Jenderal92"
},
"html_url": "https:\/\/github.com\/Jenderal92\/CHAMILO-CVE-2023-34960",
"description": "Python 2.7",
"fork": false,
"created_at": "2023-07-03T11:17:42Z",
"updated_at": "2023-07-03T12:02:55Z",
"pushed_at": "2023-07-03T11:19:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 664245908,
"name": "Chamilo_CVE-2023-34960-EXP",

View file

@ -172,10 +172,10 @@
"description": "RCE exploit for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T20:17:43Z",
"updated_at": "2023-09-12T12:12:06Z",
"updated_at": "2023-09-12T16:59:33Z",
"pushed_at": "2023-08-23T16:27:28Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -184,7 +184,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 182,
"watchers": 183,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
"fork": false,
"created_at": "2023-09-01T20:16:28Z",
"updated_at": "2023-09-12T10:40:45Z",
"updated_at": "2023-09-12T14:32:09Z",
"pushed_at": "2023-09-12T07:52:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2023-09-12T06:20:36Z",
"updated_at": "2023-09-12T16:23:01Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 177,
"watchers": 178,
"score": 0,
"subscribers_count": 4
},

32
2023/CVE-2023-37250.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 661203032,
"name": "CVE-2023-37250",
"full_name": "ewilded\/CVE-2023-37250",
"owner": {
"login": "ewilded",
"id": 1158719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
"html_url": "https:\/\/github.com\/ewilded"
},
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250",
"description": "PoC",
"fork": false,
"created_at": "2023-07-02T05:37:51Z",
"updated_at": "2023-07-07T03:46:15Z",
"pushed_at": "2023-07-03T10:34:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,7 +43,7 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-09-12T11:49:49Z",
"updated_at": "2023-09-12T15:36:16Z",
"pushed_at": "2023-08-30T14:20:43Z",
"stargazers_count": 616,
"watchers_count": 616,
@ -751,5 +751,71 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 690603491,
"name": "CVE-2023-38831",
"full_name": "Malwareman007\/CVE-2023-38831",
"owner": {
"login": "Malwareman007",
"id": 86009160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
"html_url": "https:\/\/github.com\/Malwareman007"
},
"html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-38831",
"description": "CVE-2023-38831 WinRaR Exploit Generator",
"fork": false,
"created_at": "2023-09-12T14:07:00Z",
"updated_at": "2023-09-12T14:24:58Z",
"pushed_at": "2023-09-12T16:39:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day-exploit",
"cve-2023-38831",
"exploit",
"vulnerability",
"winrar"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 690658119,
"name": "CVE-2023-38831-WinRAR-Exploit",
"full_name": "ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
"owner": {
"login": "ameerpornillos",
"id": 44928938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44928938?v=4",
"html_url": "https:\/\/github.com\/ameerpornillos"
},
"html_url": "https:\/\/github.com\/ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
"description": "Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability",
"fork": false,
"created_at": "2023-09-12T16:01:17Z",
"updated_at": "2023-09-12T16:07:54Z",
"pushed_at": "2023-09-12T16:26:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现",
"fork": false,
"created_at": "2023-09-08T05:43:12Z",
"updated_at": "2023-09-10T13:45:06Z",
"updated_at": "2023-09-12T17:27:08Z",
"pushed_at": "2023-09-08T05:48:52Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -1119,6 +1119,9 @@
<code>Cross site scripting vulnerability in Citrix ADC and Citrix Gateway in allows and attacker to perform cross site scripting
</code>
- [SirBugs/CVE-2023-24488-PoC](https://github.com/SirBugs/CVE-2023-24488-PoC)
- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
- [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488)
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
- [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
@ -1608,6 +1611,7 @@
- [gobysec/CVE-2023-28343](https://github.com/gobysec/CVE-2023-28343)
- [superzerosec/CVE-2023-28343](https://github.com/superzerosec/CVE-2023-28343)
- [hba343434/CVE-2023-28343](https://github.com/hba343434/CVE-2023-28343)
### CVE-2023-28432 (2023-03-22)
@ -2167,6 +2171,7 @@
- [YouGina/CVE-2023-32243](https://github.com/YouGina/CVE-2023-32243)
- [thatonesecguy/Wordpress-Vulnerability-Identification-Scripts](https://github.com/thatonesecguy/Wordpress-Vulnerability-Identification-Scripts)
- [manavvedawala/CVE-2023-32243-proof-of-concept](https://github.com/manavvedawala/CVE-2023-32243-proof-of-concept)
- [Jenderal92/WP-CVE-2023-32243](https://github.com/Jenderal92/WP-CVE-2023-32243)
- [shaoyu521/Mass-CVE-2023-32243](https://github.com/shaoyu521/Mass-CVE-2023-32243)
### CVE-2023-32315 (2023-05-26)
@ -2629,6 +2634,7 @@
</code>
- [Aituglo/CVE-2023-34960](https://github.com/Aituglo/CVE-2023-34960)
- [Jenderal92/CHAMILO-CVE-2023-34960](https://github.com/Jenderal92/CHAMILO-CVE-2023-34960)
- [YongYe-Security/Chamilo_CVE-2023-34960-EXP](https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP)
- [Pari-Malam/CVE-2023-34960](https://github.com/Pari-Malam/CVE-2023-34960)
- [Mantodkaz/CVE-2023-34960](https://github.com/Mantodkaz/CVE-2023-34960)
@ -2884,6 +2890,13 @@
- [sahiloj/CVE-2023-37191](https://github.com/sahiloj/CVE-2023-37191)
### CVE-2023-37250 (2023-08-20)
<code>Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in &quot;Per User&quot; mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
</code>
- [ewilded/CVE-2023-37250](https://github.com/ewilded/CVE-2023-37250)
### CVE-2023-37474 (2023-07-14)
<code>Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
@ -3106,6 +3119,8 @@
- [xaitax/WinRAR-CVE-2023-38831](https://github.com/xaitax/WinRAR-CVE-2023-38831)
- [LuxCodeDev/CVE-2023-38831_WinRAR](https://github.com/LuxCodeDev/CVE-2023-38831_WinRAR)
- [GOTonyGO/CVE-2023-38831-winrar](https://github.com/GOTonyGO/CVE-2023-38831-winrar)
- [Malwareman007/CVE-2023-38831](https://github.com/Malwareman007/CVE-2023-38831)
- [ameerpornillos/CVE-2023-38831-WinRAR-Exploit](https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit)
### CVE-2023-38836 (2023-08-21)
@ -3966,6 +3981,7 @@
</code>
- [EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679](https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679)
- [ov3rwatch/Detection-and-Mitigation-for-CVE-2022-1679](https://github.com/ov3rwatch/Detection-and-Mitigation-for-CVE-2022-1679)
### CVE-2022-1802 (2022-12-22)
@ -6891,7 +6907,6 @@
- [0xAbbarhSF/FollinaXploit](https://github.com/0xAbbarhSF/FollinaXploit)
- [michealadams30/Cve-2022-30190](https://github.com/michealadams30/Cve-2022-30190)
- [melting0256/Enterprise-Cybersecurity](https://github.com/melting0256/Enterprise-Cybersecurity)
- [3barz/Follina_Vagrant](https://github.com/3barz/Follina_Vagrant)
- [yrkuo/CVE-2022-30190](https://github.com/yrkuo/CVE-2022-30190)
- [ToxicEnvelope/FOLLINA-CVE-2022-30190](https://github.com/ToxicEnvelope/FOLLINA-CVE-2022-30190)
- [meowhua15/CVE-2022-30190](https://github.com/meowhua15/CVE-2022-30190)
@ -24567,6 +24582,7 @@
- [ianxtianxt/CVE-2019-19781](https://github.com/ianxtianxt/CVE-2019-19781)
- [mpgn/CVE-2019-19781](https://github.com/mpgn/CVE-2019-19781)
- [oways/CVE-2019-19781](https://github.com/oways/CVE-2019-19781)
- [becrevex/Citrix_CVE-2019-19781](https://github.com/becrevex/Citrix_CVE-2019-19781)
- [unknowndevice64/Exploits_CVE-2019-19781](https://github.com/unknowndevice64/Exploits_CVE-2019-19781)
- [haxrob/citrixmash_scanner](https://github.com/haxrob/citrixmash_scanner)
- [jamesjguthrie/Shitrix-CVE-2019-19781](https://github.com/jamesjguthrie/Shitrix-CVE-2019-19781)
@ -24859,6 +24875,13 @@
- [preempt/credssp](https://github.com/preempt/credssp)
### CVE-2018-0952 (2018-08-15)
<code>An Elevation of Privilege vulnerability exists when Diagnostics Hub Standard Collector allows file creation in arbitrary locations, aka &quot;Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability.&quot; This affects Windows Server 2016, Windows 10, Microsoft Visual Studio, Windows 10 Servers.
</code>
- [atredispartners/CVE-2018-0952-SystemCollector](https://github.com/atredispartners/CVE-2018-0952-SystemCollector)
### CVE-2018-0959 (2018-05-09)
<code>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka &quot;Hyper-V Remote Code Execution Vulnerability.&quot; This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
@ -26365,6 +26388,7 @@
</code>
- [manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958](https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958)
- [orangepirate/cve-2018-9948-9958-exp](https://github.com/orangepirate/cve-2018-9948-9958-exp)
### CVE-2018-9950 (2018-05-17)
@ -31136,6 +31160,13 @@
- [0xcl/cve-2016-7190](https://github.com/0xcl/cve-2016-7190)
### CVE-2016-7200 (2016-11-10)
<code>The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka &quot;Scripting Engine Memory Corruption Vulnerability,&quot; a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
</code>
- [theori-io/chakra-2016-11](https://github.com/theori-io/chakra-2016-11)
### CVE-2016-7255 (2016-11-10)
<code>The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka &quot;Win32k Elevation of Privilege Vulnerability.&quot;