mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/09/12 18:51:52
This commit is contained in:
parent
c545d1bcc6
commit
a7f7666962
27 changed files with 514 additions and 81 deletions
|
@ -62,6 +62,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/c0r0n3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0r0n3r\/dheater",
|
||||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
|
||||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2023-09-08T18:26:00Z",
|
||||
"pushed_at": "2023-05-07T11:39:29Z",
|
||||
"updated_at": "2023-09-12T16:39:15Z",
|
||||
"pushed_at": "2023-09-12T16:52:26Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
|
|
32
2016/CVE-2016-7200.json
Normal file
32
2016/CVE-2016-7200.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 78062082,
|
||||
"name": "chakra-2016-11",
|
||||
"full_name": "theori-io\/chakra-2016-11",
|
||||
"owner": {
|
||||
"login": "theori-io",
|
||||
"id": 18063559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18063559?v=4",
|
||||
"html_url": "https:\/\/github.com\/theori-io"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theori-io\/chakra-2016-11",
|
||||
"description": "Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-04T23:41:27Z",
|
||||
"updated_at": "2023-09-07T16:47:11Z",
|
||||
"pushed_at": "2017-01-04T23:42:46Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 139,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
}
|
||||
]
|
|
@ -57,7 +57,7 @@
|
|||
"forks": 8,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 106053959,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Hikvision camera CVE-2017-7921-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-27T11:49:40Z",
|
||||
"updated_at": "2023-09-05T16:42:05Z",
|
||||
"updated_at": "2023-09-12T13:47:08Z",
|
||||
"pushed_at": "2023-05-22T23:24:36Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
32
2018/CVE-2018-0952.json
Normal file
32
2018/CVE-2018-0952.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 145615979,
|
||||
"name": "CVE-2018-0952-SystemCollector",
|
||||
"full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
|
||||
"owner": {
|
||||
"login": "atredispartners",
|
||||
"id": 7254370,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4",
|
||||
"html_url": "https:\/\/github.com\/atredispartners"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
|
||||
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T20:29:10Z",
|
||||
"updated_at": "2023-09-10T08:29:58Z",
|
||||
"pushed_at": "2018-08-21T20:30:24Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 145526091,
|
||||
"name": "cve-2018-9948-9958-exp",
|
||||
"full_name": "orangepirate\/cve-2018-9948-9958-exp",
|
||||
"owner": {
|
||||
"login": "orangepirate",
|
||||
"id": 40813235,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40813235?v=4",
|
||||
"html_url": "https:\/\/github.com\/orangepirate"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orangepirate\/cve-2018-9948-9958-exp",
|
||||
"description": "a exp for cve-2018-9948\/9958 , current shellcode called win-calc ",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T07:43:38Z",
|
||||
"updated_at": "2018-08-24T00:18:07Z",
|
||||
"pushed_at": "2018-08-24T00:18:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -217,6 +217,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 233274912,
|
||||
"name": "Citrix_CVE-2019-19781",
|
||||
"full_name": "becrevex\/Citrix_CVE-2019-19781",
|
||||
"owner": {
|
||||
"login": "becrevex",
|
||||
"id": 8326868,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4",
|
||||
"html_url": "https:\/\/github.com\/becrevex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/becrevex\/Citrix_CVE-2019-19781",
|
||||
"description": "Took at stab at an NSE discovery script for CVE-2019-19781.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T18:04:17Z",
|
||||
"updated_at": "2022-06-27T14:55:57Z",
|
||||
"pushed_at": "2020-01-11T19:48:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 233294562,
|
||||
"name": "Exploits_CVE-2019-19781",
|
||||
|
|
|
@ -980,10 +980,10 @@
|
|||
"description": "POC for checking multiple hosts for Zerologon vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-29T18:45:44Z",
|
||||
"updated_at": "2023-06-04T11:52:31Z",
|
||||
"updated_at": "2023-09-12T14:11:48Z",
|
||||
"pushed_at": "2020-10-05T07:47:02Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -992,7 +992,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 690703239,
|
||||
"name": "Detection-and-Mitigation-for-CVE-2022-1679",
|
||||
"full_name": "ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
|
||||
"owner": {
|
||||
"login": "ov3rwatch",
|
||||
"id": 23441286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23441286?v=4",
|
||||
"html_url": "https:\/\/github.com\/ov3rwatch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-12T17:47:01Z",
|
||||
"updated_at": "2023-09-12T17:48:39Z",
|
||||
"pushed_at": "2023-09-12T17:48:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -2355,36 +2355,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 588668068,
|
||||
"name": "Follina_Vagrant",
|
||||
"full_name": "3barz\/Follina_Vagrant",
|
||||
"owner": {
|
||||
"login": "3barz",
|
||||
"id": 113859310,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113859310?v=4",
|
||||
"html_url": "https:\/\/github.com\/3barz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/3barz\/Follina_Vagrant",
|
||||
"description": "Follina(CVE-2022-30190) Vagrant Demo",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-13T17:32:13Z",
|
||||
"updated_at": "2023-01-13T17:36:25Z",
|
||||
"pushed_at": "2023-01-13T17:36:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 601379517,
|
||||
"name": "CVE-2022-30190",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-34265 (Django)",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-07T07:45:28Z",
|
||||
"updated_at": "2023-08-30T09:42:45Z",
|
||||
"updated_at": "2023-09-12T15:37:08Z",
|
||||
"pushed_at": "2022-07-30T07:53:43Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T21:26:28Z",
|
||||
"updated_at": "2023-08-24T20:45:31Z",
|
||||
"updated_at": "2023-09-12T15:26:04Z",
|
||||
"pushed_at": "2023-01-19T13:10:07Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -1,4 +1,94 @@
|
|||
[
|
||||
{
|
||||
"id": 661072883,
|
||||
"name": "CVE-2023-24488-PoC",
|
||||
"full_name": "SirBugs\/CVE-2023-24488-PoC",
|
||||
"owner": {
|
||||
"login": "SirBugs",
|
||||
"id": 37689994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37689994?v=4",
|
||||
"html_url": "https:\/\/github.com\/SirBugs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SirBugs\/CVE-2023-24488-PoC",
|
||||
"description": "CVE-2023-24488 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-01T17:47:17Z",
|
||||
"updated_at": "2023-07-24T21:45:44Z",
|
||||
"pushed_at": "2023-07-01T17:49:16Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 661909414,
|
||||
"name": "CVE-2023-24488",
|
||||
"full_name": "Abo5\/CVE-2023-24488",
|
||||
"owner": {
|
||||
"login": "Abo5",
|
||||
"id": 40110835,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
|
||||
"html_url": "https:\/\/github.com\/Abo5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Abo5\/CVE-2023-24488",
|
||||
"description": "CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-04T00:29:56Z",
|
||||
"updated_at": "2023-07-22T18:29:56Z",
|
||||
"pushed_at": "2023-07-04T00:40:46Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 662260047,
|
||||
"name": "CVE-2023-24488",
|
||||
"full_name": "securitycipher\/CVE-2023-24488",
|
||||
"owner": {
|
||||
"login": "securitycipher",
|
||||
"id": 111536600,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111536600?v=4",
|
||||
"html_url": "https:\/\/github.com\/securitycipher"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securitycipher\/CVE-2023-24488",
|
||||
"description": "POC for CVE-2023-24488",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-04T18:02:50Z",
|
||||
"updated_at": "2023-07-19T18:59:08Z",
|
||||
"pushed_at": "2023-07-04T18:39:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 662853030,
|
||||
"name": "cve-2023-24488",
|
||||
|
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 661672662,
|
||||
"name": "CVE-2023-28343",
|
||||
"full_name": "hba343434\/CVE-2023-28343",
|
||||
"owner": {
|
||||
"login": "hba343434",
|
||||
"id": 120598843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120598843?v=4",
|
||||
"html_url": "https:\/\/github.com\/hba343434"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hba343434\/CVE-2023-28343",
|
||||
"description": "CVE-2023-28343",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T11:48:21Z",
|
||||
"updated_at": "2023-07-06T15:42:44Z",
|
||||
"pushed_at": "2023-07-03T11:50:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3124 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-05T12:32:50Z",
|
||||
"updated_at": "2023-09-05T12:41:27Z",
|
||||
"updated_at": "2023-09-12T16:31:05Z",
|
||||
"pushed_at": "2023-09-05T15:58:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T03:06:40Z",
|
||||
"updated_at": "2023-09-12T09:18:12Z",
|
||||
"updated_at": "2023-09-12T15:22:37Z",
|
||||
"pushed_at": "2023-05-16T04:34:16Z",
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 325,
|
||||
"watchers": 326,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -243,6 +243,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 661522187,
|
||||
"name": "WP-CVE-2023-32243",
|
||||
"full_name": "Jenderal92\/WP-CVE-2023-32243",
|
||||
"owner": {
|
||||
"login": "Jenderal92",
|
||||
"id": 59664965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jenderal92"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-32243",
|
||||
"description": "Python 2.7",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T04:16:16Z",
|
||||
"updated_at": "2023-07-24T14:30:30Z",
|
||||
"pushed_at": "2023-07-03T04:17:45Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 672367254,
|
||||
"name": "Mass-CVE-2023-32243",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-09-12T02:10:03Z",
|
||||
"updated_at": "2023-09-12T15:01:18Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"stargazers_count": 416,
|
||||
"watchers_count": 416,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 415,
|
||||
"watchers": 416,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -29,6 +29,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 661661784,
|
||||
"name": "CHAMILO-CVE-2023-34960",
|
||||
"full_name": "Jenderal92\/CHAMILO-CVE-2023-34960",
|
||||
"owner": {
|
||||
"login": "Jenderal92",
|
||||
"id": 59664965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jenderal92"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/CHAMILO-CVE-2023-34960",
|
||||
"description": "Python 2.7",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T11:17:42Z",
|
||||
"updated_at": "2023-07-03T12:02:55Z",
|
||||
"pushed_at": "2023-07-03T11:19:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 664245908,
|
||||
"name": "Chamilo_CVE-2023-34960-EXP",
|
||||
|
|
|
@ -172,10 +172,10 @@
|
|||
"description": "RCE exploit for CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-21T20:17:43Z",
|
||||
"updated_at": "2023-09-12T12:12:06Z",
|
||||
"updated_at": "2023-09-12T16:59:33Z",
|
||||
"pushed_at": "2023-08-23T16:27:28Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -184,7 +184,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 182,
|
||||
"watchers": 183,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T20:16:28Z",
|
||||
"updated_at": "2023-09-12T10:40:45Z",
|
||||
"updated_at": "2023-09-12T14:32:09Z",
|
||||
"pushed_at": "2023-09-12T07:52:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T12:07:40Z",
|
||||
"updated_at": "2023-09-12T06:20:36Z",
|
||||
"updated_at": "2023-09-12T16:23:01Z",
|
||||
"pushed_at": "2023-08-23T16:46:53Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
32
2023/CVE-2023-37250.json
Normal file
32
2023/CVE-2023-37250.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 661203032,
|
||||
"name": "CVE-2023-37250",
|
||||
"full_name": "ewilded\/CVE-2023-37250",
|
||||
"owner": {
|
||||
"login": "ewilded",
|
||||
"id": 1158719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
|
||||
"html_url": "https:\/\/github.com\/ewilded"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250",
|
||||
"description": "PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-02T05:37:51Z",
|
||||
"updated_at": "2023-07-07T03:46:15Z",
|
||||
"pushed_at": "2023-07-03T10:34:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,7 +43,7 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-09-12T11:49:49Z",
|
||||
"updated_at": "2023-09-12T15:36:16Z",
|
||||
"pushed_at": "2023-08-30T14:20:43Z",
|
||||
"stargazers_count": 616,
|
||||
"watchers_count": 616,
|
||||
|
@ -751,5 +751,71 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 690603491,
|
||||
"name": "CVE-2023-38831",
|
||||
"full_name": "Malwareman007\/CVE-2023-38831",
|
||||
"owner": {
|
||||
"login": "Malwareman007",
|
||||
"id": 86009160,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
|
||||
"html_url": "https:\/\/github.com\/Malwareman007"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-38831",
|
||||
"description": "CVE-2023-38831 WinRaR Exploit Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-12T14:07:00Z",
|
||||
"updated_at": "2023-09-12T14:24:58Z",
|
||||
"pushed_at": "2023-09-12T16:39:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day-exploit",
|
||||
"cve-2023-38831",
|
||||
"exploit",
|
||||
"vulnerability",
|
||||
"winrar"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 690658119,
|
||||
"name": "CVE-2023-38831-WinRAR-Exploit",
|
||||
"full_name": "ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
|
||||
"owner": {
|
||||
"login": "ameerpornillos",
|
||||
"id": 44928938,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44928938?v=4",
|
||||
"html_url": "https:\/\/github.com\/ameerpornillos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
|
||||
"description": "Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-12T16:01:17Z",
|
||||
"updated_at": "2023-09-12T16:07:54Z",
|
||||
"pushed_at": "2023-09-12T16:26:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-08T05:43:12Z",
|
||||
"updated_at": "2023-09-10T13:45:06Z",
|
||||
"updated_at": "2023-09-12T17:27:08Z",
|
||||
"pushed_at": "2023-09-08T05:48:52Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
README.md
33
README.md
|
@ -1119,6 +1119,9 @@
|
|||
<code>Cross site scripting vulnerability in Citrix ADC and Citrix Gateway in allows and attacker to perform cross site scripting
|
||||
</code>
|
||||
|
||||
- [SirBugs/CVE-2023-24488-PoC](https://github.com/SirBugs/CVE-2023-24488-PoC)
|
||||
- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
|
||||
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
|
||||
- [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488)
|
||||
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
|
||||
- [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
|
||||
|
@ -1608,6 +1611,7 @@
|
|||
|
||||
- [gobysec/CVE-2023-28343](https://github.com/gobysec/CVE-2023-28343)
|
||||
- [superzerosec/CVE-2023-28343](https://github.com/superzerosec/CVE-2023-28343)
|
||||
- [hba343434/CVE-2023-28343](https://github.com/hba343434/CVE-2023-28343)
|
||||
|
||||
### CVE-2023-28432 (2023-03-22)
|
||||
|
||||
|
@ -2167,6 +2171,7 @@
|
|||
- [YouGina/CVE-2023-32243](https://github.com/YouGina/CVE-2023-32243)
|
||||
- [thatonesecguy/Wordpress-Vulnerability-Identification-Scripts](https://github.com/thatonesecguy/Wordpress-Vulnerability-Identification-Scripts)
|
||||
- [manavvedawala/CVE-2023-32243-proof-of-concept](https://github.com/manavvedawala/CVE-2023-32243-proof-of-concept)
|
||||
- [Jenderal92/WP-CVE-2023-32243](https://github.com/Jenderal92/WP-CVE-2023-32243)
|
||||
- [shaoyu521/Mass-CVE-2023-32243](https://github.com/shaoyu521/Mass-CVE-2023-32243)
|
||||
|
||||
### CVE-2023-32315 (2023-05-26)
|
||||
|
@ -2629,6 +2634,7 @@
|
|||
</code>
|
||||
|
||||
- [Aituglo/CVE-2023-34960](https://github.com/Aituglo/CVE-2023-34960)
|
||||
- [Jenderal92/CHAMILO-CVE-2023-34960](https://github.com/Jenderal92/CHAMILO-CVE-2023-34960)
|
||||
- [YongYe-Security/Chamilo_CVE-2023-34960-EXP](https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP)
|
||||
- [Pari-Malam/CVE-2023-34960](https://github.com/Pari-Malam/CVE-2023-34960)
|
||||
- [Mantodkaz/CVE-2023-34960](https://github.com/Mantodkaz/CVE-2023-34960)
|
||||
|
@ -2884,6 +2890,13 @@
|
|||
|
||||
- [sahiloj/CVE-2023-37191](https://github.com/sahiloj/CVE-2023-37191)
|
||||
|
||||
### CVE-2023-37250 (2023-08-20)
|
||||
|
||||
<code>Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
|
||||
</code>
|
||||
|
||||
- [ewilded/CVE-2023-37250](https://github.com/ewilded/CVE-2023-37250)
|
||||
|
||||
### CVE-2023-37474 (2023-07-14)
|
||||
|
||||
<code>Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||
|
@ -3106,6 +3119,8 @@
|
|||
- [xaitax/WinRAR-CVE-2023-38831](https://github.com/xaitax/WinRAR-CVE-2023-38831)
|
||||
- [LuxCodeDev/CVE-2023-38831_WinRAR](https://github.com/LuxCodeDev/CVE-2023-38831_WinRAR)
|
||||
- [GOTonyGO/CVE-2023-38831-winrar](https://github.com/GOTonyGO/CVE-2023-38831-winrar)
|
||||
- [Malwareman007/CVE-2023-38831](https://github.com/Malwareman007/CVE-2023-38831)
|
||||
- [ameerpornillos/CVE-2023-38831-WinRAR-Exploit](https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit)
|
||||
|
||||
### CVE-2023-38836 (2023-08-21)
|
||||
|
||||
|
@ -3966,6 +3981,7 @@
|
|||
</code>
|
||||
|
||||
- [EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679](https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679)
|
||||
- [ov3rwatch/Detection-and-Mitigation-for-CVE-2022-1679](https://github.com/ov3rwatch/Detection-and-Mitigation-for-CVE-2022-1679)
|
||||
|
||||
### CVE-2022-1802 (2022-12-22)
|
||||
|
||||
|
@ -6891,7 +6907,6 @@
|
|||
- [0xAbbarhSF/FollinaXploit](https://github.com/0xAbbarhSF/FollinaXploit)
|
||||
- [michealadams30/Cve-2022-30190](https://github.com/michealadams30/Cve-2022-30190)
|
||||
- [melting0256/Enterprise-Cybersecurity](https://github.com/melting0256/Enterprise-Cybersecurity)
|
||||
- [3barz/Follina_Vagrant](https://github.com/3barz/Follina_Vagrant)
|
||||
- [yrkuo/CVE-2022-30190](https://github.com/yrkuo/CVE-2022-30190)
|
||||
- [ToxicEnvelope/FOLLINA-CVE-2022-30190](https://github.com/ToxicEnvelope/FOLLINA-CVE-2022-30190)
|
||||
- [meowhua15/CVE-2022-30190](https://github.com/meowhua15/CVE-2022-30190)
|
||||
|
@ -24567,6 +24582,7 @@
|
|||
- [ianxtianxt/CVE-2019-19781](https://github.com/ianxtianxt/CVE-2019-19781)
|
||||
- [mpgn/CVE-2019-19781](https://github.com/mpgn/CVE-2019-19781)
|
||||
- [oways/CVE-2019-19781](https://github.com/oways/CVE-2019-19781)
|
||||
- [becrevex/Citrix_CVE-2019-19781](https://github.com/becrevex/Citrix_CVE-2019-19781)
|
||||
- [unknowndevice64/Exploits_CVE-2019-19781](https://github.com/unknowndevice64/Exploits_CVE-2019-19781)
|
||||
- [haxrob/citrixmash_scanner](https://github.com/haxrob/citrixmash_scanner)
|
||||
- [jamesjguthrie/Shitrix-CVE-2019-19781](https://github.com/jamesjguthrie/Shitrix-CVE-2019-19781)
|
||||
|
@ -24859,6 +24875,13 @@
|
|||
|
||||
- [preempt/credssp](https://github.com/preempt/credssp)
|
||||
|
||||
### CVE-2018-0952 (2018-08-15)
|
||||
|
||||
<code>An Elevation of Privilege vulnerability exists when Diagnostics Hub Standard Collector allows file creation in arbitrary locations, aka "Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Microsoft Visual Studio, Windows 10 Servers.
|
||||
</code>
|
||||
|
||||
- [atredispartners/CVE-2018-0952-SystemCollector](https://github.com/atredispartners/CVE-2018-0952-SystemCollector)
|
||||
|
||||
### CVE-2018-0959 (2018-05-09)
|
||||
|
||||
<code>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
|
||||
|
@ -26365,6 +26388,7 @@
|
|||
</code>
|
||||
|
||||
- [manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958](https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958)
|
||||
- [orangepirate/cve-2018-9948-9958-exp](https://github.com/orangepirate/cve-2018-9948-9958-exp)
|
||||
|
||||
### CVE-2018-9950 (2018-05-17)
|
||||
|
||||
|
@ -31136,6 +31160,13 @@
|
|||
|
||||
- [0xcl/cve-2016-7190](https://github.com/0xcl/cve-2016-7190)
|
||||
|
||||
### CVE-2016-7200 (2016-11-10)
|
||||
|
||||
<code>The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
|
||||
</code>
|
||||
|
||||
- [theori-io/chakra-2016-11](https://github.com/theori-io/chakra-2016-11)
|
||||
|
||||
### CVE-2016-7255 (2016-11-10)
|
||||
|
||||
<code>The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
|
||||
|
|
Loading…
Reference in a new issue