mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/11/13 18:52:59
This commit is contained in:
parent
4ac39f85a5
commit
a80f6a0c36
55 changed files with 282 additions and 821 deletions
|
@ -28,5 +28,35 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 338099634,
|
||||
"name": "dns-zone-transfer-test",
|
||||
"full_name": "Rodney-O-C-Melby\/dns-zone-transfer-test",
|
||||
"owner": {
|
||||
"login": "Rodney-O-C-Melby",
|
||||
"id": 16503898,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test",
|
||||
"description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T17:25:24Z",
|
||||
"updated_at": "2023-03-27T20:49:20Z",
|
||||
"pushed_at": "2022-05-02T13:11:16Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 271031736,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-06T17:21:32Z",
|
||||
"updated_at": "2023-08-09T21:34:29Z",
|
||||
"updated_at": "2023-11-13T15:33:55Z",
|
||||
"pushed_at": "2016-07-02T18:52:16Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-09T17:13:30Z",
|
||||
"updated_at": "2023-11-10T19:53:15Z",
|
||||
"pushed_at": "2023-11-09T17:22:40Z",
|
||||
"pushed_at": "2023-11-13T13:28:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -177,6 +177,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -80,10 +80,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2023-11-10T21:20:07Z",
|
||||
"updated_at": "2023-11-13T13:44:08Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 558,
|
||||
"watchers_count": 558,
|
||||
"stargazers_count": 559,
|
||||
"watchers_count": 559,
|
||||
"has_discussions": false,
|
||||
"forks_count": 183,
|
||||
"allow_forking": true,
|
||||
|
@ -102,7 +102,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 183,
|
||||
"watchers": 558,
|
||||
"watchers": 559,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -258,7 +258,7 @@
|
|||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -271,7 +271,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 644577238,
|
||||
|
|
|
@ -205,13 +205,13 @@
|
|||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"has_discussions": false,
|
||||
"forks_count": 91,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"forks": 92,
|
||||
"watchers": 343,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-28T06:51:26Z",
|
||||
"updated_at": "2023-03-18T17:11:16Z",
|
||||
"updated_at": "2023-11-13T17:58:32Z",
|
||||
"pushed_at": "2021-07-10T12:42:24Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -434,10 +434,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2023-11-03T09:56:20Z",
|
||||
"updated_at": "2023-11-13T16:25:49Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
|
@ -446,7 +446,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -475,13 +475,13 @@
|
|||
"stargazers_count": 896,
|
||||
"watchers_count": 896,
|
||||
"has_discussions": false,
|
||||
"forks_count": 242,
|
||||
"forks_count": 243,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 242,
|
||||
"forks": 243,
|
||||
"watchers": 896,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
|
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-11-11T14:51:59Z",
|
||||
"updated_at": "2023-11-13T14:48:19Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 904,
|
||||
"watchers_count": 904,
|
||||
"stargazers_count": 905,
|
||||
"watchers_count": 905,
|
||||
"has_discussions": false,
|
||||
"forks_count": 175,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 175,
|
||||
"watchers": 904,
|
||||
"watchers": 905,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-11-09T09:22:47Z",
|
||||
"updated_at": "2023-11-13T15:34:09Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 740,
|
||||
"watchers_count": 740,
|
||||
"stargazers_count": 741,
|
||||
"watchers_count": 741,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 740,
|
||||
"watchers": 741,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -12333,5 +12333,43 @@
|
|||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 718233980,
|
||||
"name": "CVE-2021-44228",
|
||||
"full_name": "LucasPDiniz\/CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "LucasPDiniz",
|
||||
"id": 57265360,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
|
||||
"html_url": "https:\/\/github.com\/LucasPDiniz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-44228",
|
||||
"description": "Log4j Vulnerability RCE - CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T16:57:22Z",
|
||||
"updated_at": "2023-11-13T17:09:40Z",
|
||||
"pushed_at": "2023-11-13T17:09:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"2021",
|
||||
"cve-2021-44228",
|
||||
"log4j",
|
||||
"rce",
|
||||
"solaris",
|
||||
"solr",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -2323,36 +2323,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 585137919,
|
||||
"name": "Dirty-Pipe-CVE-2022-0847-POCs",
|
||||
"full_name": "ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
|
||||
"owner": {
|
||||
"login": "ajith737",
|
||||
"id": 72512571,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
|
||||
"html_url": "https:\/\/github.com\/ajith737"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T12:17:12Z",
|
||||
"updated_at": "2023-01-04T12:17:19Z",
|
||||
"pushed_at": "2023-01-04T12:51:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 592661297,
|
||||
"name": "CVE-2022-0847",
|
||||
|
|
|
@ -94,35 +94,5 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 594762176,
|
||||
"name": "CVE-2022-1329",
|
||||
"full_name": "dexit\/CVE-2022-1329",
|
||||
"owner": {
|
||||
"login": "dexit",
|
||||
"id": 6205151,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6205151?v=4",
|
||||
"html_url": "https:\/\/github.com\/dexit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dexit\/CVE-2022-1329",
|
||||
"description": "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~\/core\/app\/modules\/onboarding\/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to o CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-29T15:13:34Z",
|
||||
"updated_at": "2023-02-20T12:39:20Z",
|
||||
"pushed_at": "2022-12-28T12:11:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 584611982,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20470",
|
||||
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-03T03:54:59Z",
|
||||
"updated_at": "2023-03-27T01:47:22Z",
|
||||
"pushed_at": "2023-01-03T04:01:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,62 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 584289667,
|
||||
"name": "frameworks_minikin_AOSP10_r33_CVE-2022-20473",
|
||||
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-02T05:55:37Z",
|
||||
"updated_at": "2023-01-02T05:55:37Z",
|
||||
"pushed_at": null,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 584624006,
|
||||
"name": "frameworks_minikin_AOSP10_r33-CVE-2022-20473",
|
||||
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-03T04:51:12Z",
|
||||
"updated_at": "2023-01-03T04:53:10Z",
|
||||
"pushed_at": "2023-01-03T04:53:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 598379401,
|
||||
"name": "CVE-2022-20607",
|
||||
"full_name": "sumeetIT\/CVE-2022-20607",
|
||||
"owner": {
|
||||
"login": "sumeetIT",
|
||||
"id": 54736912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54736912?v=4",
|
||||
"html_url": "https:\/\/github.com\/sumeetIT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sumeetIT\/CVE-2022-20607",
|
||||
"description": "In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N\/A CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T01:28:29Z",
|
||||
"updated_at": "2023-02-20T12:01:39Z",
|
||||
"pushed_at": "2022-12-27T12:10:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2023-11-03T07:59:06Z",
|
||||
"updated_at": "2023-11-13T15:06:15Z",
|
||||
"pushed_at": "2022-11-09T15:46:06Z",
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 339,
|
||||
"watchers": 340,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -2109,36 +2109,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 584868904,
|
||||
"name": "Spring4Shell-CVE-2022-22965-POC",
|
||||
"full_name": "ajith737\/Spring4Shell-CVE-2022-22965-POC",
|
||||
"owner": {
|
||||
"login": "ajith737",
|
||||
"id": 72512571,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
|
||||
"html_url": "https:\/\/github.com\/ajith737"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ajith737\/Spring4Shell-CVE-2022-22965-POC",
|
||||
"description": "User friendly Spring4Shell POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-03T18:15:07Z",
|
||||
"updated_at": "2023-01-03T18:15:14Z",
|
||||
"pushed_at": "2023-01-03T18:53:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 608448692,
|
||||
"name": "CVE-2022-22965",
|
||||
|
|
|
@ -58,35 +58,5 @@
|
|||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 609374925,
|
||||
"name": "CVE-2022-28346",
|
||||
"full_name": "vincentinttsh\/CVE-2022-28346",
|
||||
"owner": {
|
||||
"login": "vincentinttsh",
|
||||
"id": 14941597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941597?v=4",
|
||||
"html_url": "https:\/\/github.com\/vincentinttsh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vincentinttsh\/CVE-2022-28346",
|
||||
"description": "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-04T01:43:58Z",
|
||||
"updated_at": "2022-08-24T08:06:59Z",
|
||||
"pushed_at": "2022-05-15T00:53:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Foxit PDF Reader Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-02T18:52:20Z",
|
||||
"updated_at": "2023-11-05T06:49:36Z",
|
||||
"updated_at": "2023-11-13T13:49:34Z",
|
||||
"pushed_at": "2023-02-27T04:53:11Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -36,38 +36,8 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 584971290,
|
||||
"name": "CVE-2022-28672",
|
||||
"full_name": "fastmo\/CVE-2022-28672",
|
||||
"owner": {
|
||||
"login": "fastmo",
|
||||
"id": 53575270,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
|
||||
"html_url": "https:\/\/github.com\/fastmo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fastmo\/CVE-2022-28672",
|
||||
"description": " CVE-2022-28672 Vulnerabilidad Foxit PDF Reader - UaF - RCE - JIT Spraying",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T01:39:04Z",
|
||||
"updated_at": "2023-01-04T02:03:45Z",
|
||||
"pushed_at": "2023-01-04T02:04:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 594668634,
|
||||
"name": "CVE-2022-29170",
|
||||
"full_name": "yijikeji\/CVE-2022-29170",
|
||||
"owner": {
|
||||
"login": "yijikeji",
|
||||
"id": 42433368,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42433368?v=4",
|
||||
"html_url": "https:\/\/github.com\/yijikeji"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yijikeji\/CVE-2022-29170",
|
||||
"description": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-29T09:10:44Z",
|
||||
"updated_at": "2023-02-20T13:57:30Z",
|
||||
"pushed_at": "2022-12-29T07:40:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-11-11T01:51:32Z",
|
||||
"updated_at": "2023-11-13T15:12:56Z",
|
||||
"pushed_at": "2023-11-05T13:34:13Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"has_discussions": true,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-31T13:24:34Z",
|
||||
"updated_at": "2023-09-29T23:48:54Z",
|
||||
"updated_at": "2023-11-13T14:48:00Z",
|
||||
"pushed_at": "2023-02-08T17:24:05Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 590734045,
|
||||
"name": "CVE-2022-40363",
|
||||
"full_name": "Olafdaf\/CVE-2022-40363",
|
||||
"owner": {
|
||||
"login": "Olafdaf",
|
||||
"id": 123042506,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123042506?v=4",
|
||||
"html_url": "https:\/\/github.com\/Olafdaf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Olafdaf\/CVE-2022-40363",
|
||||
"description": "A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T04:19:42Z",
|
||||
"updated_at": "2023-09-06T21:52:46Z",
|
||||
"pushed_at": "2022-12-29T11:12:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 594246349,
|
||||
"name": "CVE-2022-40769",
|
||||
"full_name": "PLSRcoin\/CVE-2022-40769",
|
||||
"owner": {
|
||||
"login": "PLSRcoin",
|
||||
"id": 99826299,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99826299?v=4",
|
||||
"html_url": "https:\/\/github.com\/PLSRcoin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PLSRcoin\/CVE-2022-40769",
|
||||
"description": "profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-28T00:12:31Z",
|
||||
"updated_at": "2023-02-20T14:52:04Z",
|
||||
"pushed_at": "2022-12-29T15:29:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T09:35:26Z",
|
||||
"updated_at": "2023-10-26T07:28:04Z",
|
||||
"updated_at": "2023-11-13T13:40:41Z",
|
||||
"pushed_at": "2023-01-10T08:09:36Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 584184679,
|
||||
"name": "CVE-2022-41114",
|
||||
"full_name": "gmh5225\/CVE-2022-41114",
|
||||
"owner": {
|
||||
"login": "gmh5225",
|
||||
"id": 13917777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmh5225"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-41114",
|
||||
"description": "Windows Bind Filter Driver Elevation of Privilege Vulnerability. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-01T18:30:30Z",
|
||||
"updated_at": "2023-02-20T12:35:54Z",
|
||||
"pushed_at": "2022-12-28T09:34:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 585251034,
|
||||
"name": "CVE-2022-45728",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-45728",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45728",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:41:57Z",
|
||||
"updated_at": "2023-01-04T17:41:57Z",
|
||||
"pushed_at": "2023-01-04T17:43:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -89,44 +89,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 584490516,
|
||||
"name": "CVE-2022-46169",
|
||||
"full_name": "Inplex-sys\/CVE-2022-46169",
|
||||
"owner": {
|
||||
"login": "Inplex-sys",
|
||||
"id": 69421356,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
|
||||
"html_url": "https:\/\/github.com\/Inplex-sys"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
|
||||
"description": "Cacti Unauthenticated Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-02T18:03:26Z",
|
||||
"updated_at": "2023-03-11T00:41:32Z",
|
||||
"pushed_at": "2023-01-02T18:05:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cacti",
|
||||
"cve",
|
||||
"hgrab-framework",
|
||||
"poc",
|
||||
"rce",
|
||||
"scanner",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 585629170,
|
||||
"name": "CVE-2022-46169",
|
||||
|
|
|
@ -1,34 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 584613908,
|
||||
"name": "CVE-2022-46366",
|
||||
"full_name": "wh-gov\/CVE-2022-46366",
|
||||
"owner": {
|
||||
"login": "wh-gov",
|
||||
"id": 120082360,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120082360?v=4",
|
||||
"html_url": "https:\/\/github.com\/wh-gov"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wh-gov\/CVE-2022-46366",
|
||||
"description": "CVE-2022-46366",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-03T04:04:29Z",
|
||||
"updated_at": "2023-01-03T06:39:52Z",
|
||||
"pushed_at": "2023-01-03T06:40:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"n"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2022-46463(Harbor 未授权)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T14:58:14Z",
|
||||
"updated_at": "2023-10-31T05:45:22Z",
|
||||
"updated_at": "2023-11-13T17:19:31Z",
|
||||
"pushed_at": "2023-01-19T12:47:21Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 584354205,
|
||||
"name": "CVE-2022-48197",
|
||||
"full_name": "ryan412\/CVE-2022-48197",
|
||||
"owner": {
|
||||
"login": "ryan412",
|
||||
"id": 54446262,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54446262?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryan412"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryan412\/CVE-2022-48197",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-02T10:27:04Z",
|
||||
"updated_at": "2023-01-02T10:27:04Z",
|
||||
"pushed_at": "2023-01-02T10:31:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -112,10 +112,10 @@
|
|||
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T08:42:17Z",
|
||||
"updated_at": "2023-11-13T12:37:27Z",
|
||||
"updated_at": "2023-11-13T14:10:02Z",
|
||||
"pushed_at": "2023-10-16T02:24:02Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -124,7 +124,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 80,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2023-11-12T21:05:49Z",
|
||||
"updated_at": "2023-11-13T17:13:36Z",
|
||||
"pushed_at": "2023-09-10T10:44:32Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -268,35 +268,5 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 704219716,
|
||||
"name": "FortiGate-CVE-2023-27997",
|
||||
"full_name": "Aicks\/FortiGate-CVE-2023-27997",
|
||||
"owner": {
|
||||
"login": "Aicks",
|
||||
"id": 147735407,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147735407?v=4",
|
||||
"html_url": "https:\/\/github.com\/Aicks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Aicks\/FortiGate-CVE-2023-27997",
|
||||
"description": "FortiGate exploit CVE-2023-27997",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T19:43:46Z",
|
||||
"updated_at": "2023-10-12T19:43:47Z",
|
||||
"pushed_at": "2023-10-12T19:44:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 29,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC repository for CVE-2023-29007",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-26T14:00:11Z",
|
||||
"updated_at": "2023-09-28T11:46:01Z",
|
||||
"updated_at": "2023-11-13T18:34:58Z",
|
||||
"pushed_at": "2023-04-26T14:21:51Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3124 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-05T12:32:50Z",
|
||||
"updated_at": "2023-10-16T11:36:54Z",
|
||||
"updated_at": "2023-11-13T17:01:52Z",
|
||||
"pushed_at": "2023-09-05T15:58:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -398,36 +398,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 704117023,
|
||||
"name": "Citrix-CVE-2023-3519",
|
||||
"full_name": "Aicks\/Citrix-CVE-2023-3519",
|
||||
"owner": {
|
||||
"login": "Aicks",
|
||||
"id": 147735407,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147735407?v=4",
|
||||
"html_url": "https:\/\/github.com\/Aicks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Aicks\/Citrix-CVE-2023-3519",
|
||||
"description": "exploit CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T15:11:55Z",
|
||||
"updated_at": "2023-10-12T19:45:03Z",
|
||||
"pushed_at": "2023-10-12T15:13:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 710927225,
|
||||
"name": "CVE-2023-3519",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T17:56:55Z",
|
||||
"updated_at": "2023-11-12T17:42:51Z",
|
||||
"updated_at": "2023-11-13T16:01:46Z",
|
||||
"pushed_at": "2023-09-26T19:02:07Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -62,35 +62,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 704998432,
|
||||
"name": "CVE-2023-3710",
|
||||
"full_name": "CwEeR313\/CVE-2023-3710",
|
||||
"owner": {
|
||||
"login": "CwEeR313",
|
||||
"id": 147943631,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147943631?v=4",
|
||||
"html_url": "https:\/\/github.com\/CwEeR313"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CwEeR313\/CVE-2023-3710",
|
||||
"description": "exploit for CVE-2023-3710",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T18:31:51Z",
|
||||
"updated_at": "2023-10-18T07:20:44Z",
|
||||
"pushed_at": "2023-10-14T21:24:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 718237903,
|
||||
"name": "CVE-2023-41064",
|
||||
"full_name": "MrR0b0t19\/CVE-2023-41064",
|
||||
"owner": {
|
||||
"login": "MrR0b0t19",
|
||||
"id": 63489501,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4",
|
||||
"html_url": "https:\/\/github.com\/MrR0b0t19"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MrR0b0t19\/CVE-2023-41064",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T17:07:02Z",
|
||||
"updated_at": "2023-11-13T17:07:15Z",
|
||||
"pushed_at": "2023-11-13T17:07:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC and Writeup for CVE-2023-46404.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-26T15:01:32Z",
|
||||
"updated_at": "2023-11-03T16:30:16Z",
|
||||
"updated_at": "2023-11-13T18:42:18Z",
|
||||
"pushed_at": "2023-10-28T17:53:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2023-11-13T08:15:51Z",
|
||||
"updated_at": "2023-11-13T14:19:04Z",
|
||||
"pushed_at": "2023-11-03T12:50:06Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 142,
|
||||
"watchers": 143,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2023-11-13T10:09:32Z",
|
||||
"updated_at": "2023-11-13T14:40:23Z",
|
||||
"pushed_at": "2023-11-10T02:12:38Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2023-11-13T06:02:20Z",
|
||||
"updated_at": "2023-11-13T13:16:52Z",
|
||||
"pushed_at": "2023-10-05T23:33:49Z",
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 253,
|
||||
"watchers": 254,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -317,10 +317,10 @@
|
|||
"description": "Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-28T20:05:30Z",
|
||||
"updated_at": "2023-11-02T23:17:58Z",
|
||||
"updated_at": "2023-11-13T15:52:03Z",
|
||||
"pushed_at": "2023-10-29T16:47:55Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -329,7 +329,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -348,7 +348,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-08T09:34:04Z",
|
||||
"updated_at": "2023-11-13T08:09:54Z",
|
||||
"pushed_at": "2023-11-08T09:40:31Z",
|
||||
"pushed_at": "2023-11-13T14:59:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -243,10 +243,10 @@
|
|||
"description": "An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-29T15:31:37Z",
|
||||
"updated_at": "2023-11-06T12:23:51Z",
|
||||
"updated_at": "2023-11-13T14:38:39Z",
|
||||
"pushed_at": "2023-10-29T17:43:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -255,7 +255,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -241,7 +241,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -249,7 +249,7 @@
|
|||
"cve-2023-5360"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
32
2023/CVE-2023-5965.json
Normal file
32
2023/CVE-2023-5965.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 554898866,
|
||||
"name": "cve-2023-5965",
|
||||
"full_name": "pedrojosenavasperez\/cve-2023-5965",
|
||||
"owner": {
|
||||
"login": "pedrojosenavasperez",
|
||||
"id": 115498883,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115498883?v=4",
|
||||
"html_url": "https:\/\/github.com\/pedrojosenavasperez"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pedrojosenavasperez\/cve-2023-5965",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-20T15:35:07Z",
|
||||
"updated_at": "2023-11-13T17:27:18Z",
|
||||
"pushed_at": "2023-11-13T17:26:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-5966.json
Normal file
32
2023/CVE-2023-5966.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 554819475,
|
||||
"name": "cve-2023-5966",
|
||||
"full_name": "pedrojosenavasperez\/cve-2023-5966",
|
||||
"owner": {
|
||||
"login": "pedrojosenavasperez",
|
||||
"id": 115498883,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115498883?v=4",
|
||||
"html_url": "https:\/\/github.com\/pedrojosenavasperez"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pedrojosenavasperez\/cve-2023-5966",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-20T13:00:10Z",
|
||||
"updated_at": "2023-11-13T17:25:12Z",
|
||||
"pushed_at": "2023-11-13T17:24:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
89
README.md
89
README.md
|
@ -576,7 +576,6 @@
|
|||
- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
|
||||
- [Chocapikk/CVE-2023-3519](https://github.com/Chocapikk/CVE-2023-3519)
|
||||
- [JonaNeidhart/CVE-2023-3519-BackdoorCheck](https://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheck)
|
||||
- [Aicks/Citrix-CVE-2023-3519](https://github.com/Aicks/Citrix-CVE-2023-3519)
|
||||
- [Mohammaddvd/CVE-2023-3519](https://github.com/Mohammaddvd/CVE-2023-3519)
|
||||
|
||||
### CVE-2023-3640 (2023-07-24)
|
||||
|
@ -593,7 +592,6 @@
|
|||
|
||||
- [vpxuser/CVE-2023-3710-POC](https://github.com/vpxuser/CVE-2023-3710-POC)
|
||||
- [Mahdi22228/CVE-2023-3710](https://github.com/Mahdi22228/CVE-2023-3710)
|
||||
- [CwEeR313/CVE-2023-3710](https://github.com/CwEeR313/CVE-2023-3710)
|
||||
|
||||
### CVE-2023-3711 (2023-09-12)
|
||||
|
||||
|
@ -905,6 +903,12 @@
|
|||
|
||||
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
|
||||
|
||||
### CVE-2023-5965
|
||||
- [pedrojosenavasperez/cve-2023-5965](https://github.com/pedrojosenavasperez/cve-2023-5965)
|
||||
|
||||
### CVE-2023-5966
|
||||
- [pedrojosenavasperez/cve-2023-5966](https://github.com/pedrojosenavasperez/cve-2023-5966)
|
||||
|
||||
### CVE-2023-20025 (2023-01-20)
|
||||
|
||||
<code>A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device. This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device.
|
||||
|
@ -2080,7 +2084,6 @@
|
|||
- [Cyb3rEnthusiast/CVE-2023-27997](https://github.com/Cyb3rEnthusiast/CVE-2023-27997)
|
||||
- [lexfo/xortigate-cve-2023-27997](https://github.com/lexfo/xortigate-cve-2023-27997)
|
||||
- [delsploit/CVE-2023-27997](https://github.com/delsploit/CVE-2023-27997)
|
||||
- [Aicks/FortiGate-CVE-2023-27997](https://github.com/Aicks/FortiGate-CVE-2023-27997)
|
||||
|
||||
### CVE-2023-28121 (2023-04-12)
|
||||
|
||||
|
@ -4246,6 +4249,7 @@
|
|||
</code>
|
||||
|
||||
- [MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064](https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064)
|
||||
- [MrR0b0t19/CVE-2023-41064](https://github.com/MrR0b0t19/CVE-2023-41064)
|
||||
|
||||
### CVE-2023-41080 (2023-08-25)
|
||||
|
||||
|
@ -5429,7 +5433,6 @@
|
|||
- [qwert419/linux-](https://github.com/qwert419/linux-)
|
||||
- [DataFox/CVE-2022-0847](https://github.com/DataFox/CVE-2022-0847)
|
||||
- [pmihsan/Dirty-Pipe-CVE-2022-0847](https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847)
|
||||
- [ajith737/Dirty-Pipe-CVE-2022-0847-POCs](https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs)
|
||||
- [mutur4/CVE-2022-0847](https://github.com/mutur4/CVE-2022-0847)
|
||||
- [orsuprasad/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [4bhishek0/CVE-2022-0847-Poc](https://github.com/4bhishek0/CVE-2022-0847-Poc)
|
||||
|
@ -5618,7 +5621,6 @@
|
|||
- [AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit](https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit)
|
||||
- [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329)
|
||||
- [Grazee/CVE-2022-1329-WordPress-Elementor-RCE](https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE)
|
||||
- [dexit/CVE-2022-1329](https://github.com/dexit/CVE-2022-1329)
|
||||
|
||||
### CVE-2022-1386 (2022-05-16)
|
||||
|
||||
|
@ -6274,21 +6276,6 @@
|
|||
|
||||
- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456)
|
||||
|
||||
### CVE-2022-20470 (2022-12-13)
|
||||
|
||||
<code>In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234013191
|
||||
</code>
|
||||
|
||||
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470)
|
||||
|
||||
### CVE-2022-20473 (2022-12-13)
|
||||
|
||||
<code>In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
|
||||
</code>
|
||||
|
||||
- [Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473)
|
||||
- [Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473)
|
||||
|
||||
### CVE-2022-20489 (2023-01-24)
|
||||
|
||||
<code>In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703460
|
||||
|
@ -6325,13 +6312,6 @@
|
|||
|
||||
- [Supersonic/CVE-2022-20494](https://github.com/Supersonic/CVE-2022-20494)
|
||||
|
||||
### CVE-2022-20607 (2022-12-16)
|
||||
|
||||
<code>In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A
|
||||
</code>
|
||||
|
||||
- [sumeetIT/CVE-2022-20607](https://github.com/sumeetIT/CVE-2022-20607)
|
||||
|
||||
### CVE-2022-20699 (2022-02-10)
|
||||
|
||||
<code>Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
|
||||
|
@ -6945,7 +6925,6 @@
|
|||
- [clemoregan/SSE4-CVE-2022-22965](https://github.com/clemoregan/SSE4-CVE-2022-22965)
|
||||
- [devengpk/CVE-2022-22965](https://github.com/devengpk/CVE-2022-22965)
|
||||
- [zangcc/CVE-2022-22965-rexbb](https://github.com/zangcc/CVE-2022-22965-rexbb)
|
||||
- [ajith737/Spring4Shell-CVE-2022-22965-POC](https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC)
|
||||
- [c33dd/CVE-2022-22965](https://github.com/c33dd/CVE-2022-22965)
|
||||
- [gokul-ramesh/Spring4Shell-PoC-exploit](https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit)
|
||||
- [bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-](https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-)
|
||||
|
@ -8241,7 +8220,6 @@
|
|||
|
||||
- [YouGina/CVE-2022-28346](https://github.com/YouGina/CVE-2022-28346)
|
||||
- [DeEpinGh0st/CVE-2022-28346](https://github.com/DeEpinGh0st/CVE-2022-28346)
|
||||
- [vincentinttsh/CVE-2022-28346](https://github.com/vincentinttsh/CVE-2022-28346)
|
||||
|
||||
### CVE-2022-28368 (2022-04-02)
|
||||
|
||||
|
@ -8307,7 +8285,6 @@
|
|||
</code>
|
||||
|
||||
- [hacksysteam/CVE-2022-28672](https://github.com/hacksysteam/CVE-2022-28672)
|
||||
- [fastmo/CVE-2022-28672](https://github.com/fastmo/CVE-2022-28672)
|
||||
|
||||
### CVE-2022-28943
|
||||
- [zhefox/CVE-2022-28943](https://github.com/zhefox/CVE-2022-28943)
|
||||
|
@ -8393,13 +8370,6 @@
|
|||
|
||||
- [EgeBalci/CVE-2022-29154](https://github.com/EgeBalci/CVE-2022-29154)
|
||||
|
||||
### CVE-2022-29170 (2022-05-20)
|
||||
|
||||
<code>Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.
|
||||
</code>
|
||||
|
||||
- [yijikeji/CVE-2022-29170](https://github.com/yijikeji/CVE-2022-29170)
|
||||
|
||||
### CVE-2022-29221 (2022-05-24)
|
||||
|
||||
<code>Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
|
||||
|
@ -10123,13 +10093,6 @@
|
|||
|
||||
- [h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated](https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated)
|
||||
|
||||
### CVE-2022-40363 (2022-09-29)
|
||||
|
||||
<code>A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.
|
||||
</code>
|
||||
|
||||
- [Olafdaf/CVE-2022-40363](https://github.com/Olafdaf/CVE-2022-40363)
|
||||
|
||||
### CVE-2022-40470 (2022-11-21)
|
||||
|
||||
<code>Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.
|
||||
|
@ -10197,13 +10160,6 @@
|
|||
|
||||
- [williamkhepri/CVE-2022-40687-metasploit-scanner](https://github.com/williamkhepri/CVE-2022-40687-metasploit-scanner)
|
||||
|
||||
### CVE-2022-40769 (2022-09-18)
|
||||
|
||||
<code>profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
|
||||
</code>
|
||||
|
||||
- [PLSRcoin/CVE-2022-40769](https://github.com/PLSRcoin/CVE-2022-40769)
|
||||
|
||||
### CVE-2022-40799 (2022-11-28)
|
||||
|
||||
<code>Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
|
||||
|
@ -10286,13 +10242,6 @@
|
|||
- [g-gill24/WinRE-Patch](https://github.com/g-gill24/WinRE-Patch)
|
||||
- [dsn1321/KB5025175-CVE-2022-41099](https://github.com/dsn1321/KB5025175-CVE-2022-41099)
|
||||
|
||||
### CVE-2022-41114 (2022-11-09)
|
||||
|
||||
<code>Windows Bind Filter Driver Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2022-41114](https://github.com/gmh5225/CVE-2022-41114)
|
||||
|
||||
### CVE-2022-41218 (2022-09-21)
|
||||
|
||||
<code>In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
|
||||
|
@ -10980,13 +10929,6 @@
|
|||
|
||||
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
|
||||
|
||||
### CVE-2022-45728 (2023-01-12)
|
||||
|
||||
<code>Doctor Appointment Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-45728](https://github.com/sudoninja-noob/CVE-2022-45728)
|
||||
|
||||
### CVE-2022-45729 (2023-01-12)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Employee ID parameter.
|
||||
|
@ -11071,7 +11013,6 @@
|
|||
- [imjdl/CVE-2022-46169](https://github.com/imjdl/CVE-2022-46169)
|
||||
- [0xf4n9x/CVE-2022-46169](https://github.com/0xf4n9x/CVE-2022-46169)
|
||||
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
|
||||
- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
|
||||
- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
|
||||
- [botfather0x0/CVE-2022-46169](https://github.com/botfather0x0/CVE-2022-46169)
|
||||
- [Habib0x0/CVE-2022-46169](https://github.com/Habib0x0/CVE-2022-46169)
|
||||
|
@ -11108,13 +11049,6 @@
|
|||
### CVE-2022-46196
|
||||
- [dpgg101/CVE-2022-46196](https://github.com/dpgg101/CVE-2022-46196)
|
||||
|
||||
### CVE-2022-46366 (2022-12-02)
|
||||
|
||||
<code>** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.
|
||||
</code>
|
||||
|
||||
- [wh-gov/CVE-2022-46366](https://github.com/wh-gov/CVE-2022-46366)
|
||||
|
||||
### CVE-2022-46381 (2022-12-13)
|
||||
|
||||
<code>Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
|
||||
|
@ -11299,13 +11233,6 @@
|
|||
|
||||
- [otsmr/internet-of-vulnerable-things](https://github.com/otsmr/internet-of-vulnerable-things)
|
||||
|
||||
### CVE-2022-48197 (2023-01-02)
|
||||
|
||||
<code>** UNSUPPORTED WHEN ASSIGNED ** Reflected cross-site scripting (XSS) exists in the TreeView of YUI2 through 2800: up.php sam.php renderhidden.php removechildren.php removeall.php readd.php overflow.php newnode2.php newnode.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
||||
</code>
|
||||
|
||||
- [ryan412/CVE-2022-48197](https://github.com/ryan412/CVE-2022-48197)
|
||||
|
||||
### CVE-2022-48311 (2023-02-06)
|
||||
|
||||
<code>**UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
||||
|
@ -17369,6 +17296,7 @@
|
|||
- [MrHarshvardhan/PY-Log4j-RCE-Scanner](https://github.com/MrHarshvardhan/PY-Log4j-RCE-Scanner)
|
||||
- [Muhammad-Ali007/Log4j_CVE-2021-44228](https://github.com/Muhammad-Ali007/Log4j_CVE-2021-44228)
|
||||
- [Tai-e/CVE-2021-44228](https://github.com/Tai-e/CVE-2021-44228)
|
||||
- [LucasPDiniz/CVE-2021-44228](https://github.com/LucasPDiniz/CVE-2021-44228)
|
||||
|
||||
### CVE-2021-44255 (2022-01-31)
|
||||
|
||||
|
@ -37157,6 +37085,7 @@
|
|||
</code>
|
||||
|
||||
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)
|
||||
- [Rodney-O-C-Melby/dns-zone-transfer-test](https://github.com/Rodney-O-C-Melby/dns-zone-transfer-test)
|
||||
|
||||
### CVE-1999-1053 (2001-09-12)
|
||||
|
||||
|
|
Loading…
Reference in a new issue