Auto Update 2023/11/13 18:52:59

This commit is contained in:
motikan2010-bot 2023-11-14 03:52:59 +09:00
parent 4ac39f85a5
commit a80f6a0c36
55 changed files with 282 additions and 821 deletions

View file

@ -28,5 +28,35 @@
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 338099634,
"name": "dns-zone-transfer-test",
"full_name": "Rodney-O-C-Melby\/dns-zone-transfer-test",
"owner": {
"login": "Rodney-O-C-Melby",
"id": 16503898,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4",
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby"
},
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test",
"description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.",
"fork": false,
"created_at": "2021-02-11T17:25:24Z",
"updated_at": "2023-03-27T20:49:20Z",
"pushed_at": "2022-05-02T13:11:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": true,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -27,7 +27,7 @@
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 271031736,

View file

@ -13,10 +13,10 @@
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
"fork": false,
"created_at": "2016-05-06T17:21:32Z",
"updated_at": "2023-08-09T21:34:29Z",
"updated_at": "2023-11-13T15:33:55Z",
"pushed_at": "2016-07-02T18:52:16Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-11-09T17:13:30Z",
"updated_at": "2023-11-10T19:53:15Z",
"pushed_at": "2023-11-09T17:22:40Z",
"pushed_at": "2023-11-13T13:28:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -177,6 +177,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -80,10 +80,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2023-11-10T21:20:07Z",
"updated_at": "2023-11-13T13:44:08Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 558,
"watchers_count": 558,
"stargazers_count": 559,
"watchers_count": 559,
"has_discussions": false,
"forks_count": 183,
"allow_forking": true,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 183,
"watchers": 558,
"watchers": 559,
"score": 0,
"subscribers_count": 23
},

View file

@ -258,7 +258,7 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -271,7 +271,7 @@
"exploit"
],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 18,
"score": 0,
"subscribers_count": 3

View file

@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 644577238,

View file

@ -205,13 +205,13 @@
"stargazers_count": 343,
"watchers_count": 343,
"has_discussions": false,
"forks_count": 91,
"forks_count": 92,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 91,
"forks": 92,
"watchers": 343,
"score": 0,
"subscribers_count": 24

View file

@ -43,10 +43,10 @@
"description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.",
"fork": false,
"created_at": "2021-06-28T06:51:26Z",
"updated_at": "2023-03-18T17:11:16Z",
"updated_at": "2023-11-13T17:58:32Z",
"pushed_at": "2021-07-10T12:42:24Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},

View file

@ -434,10 +434,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-09T16:54:39Z",
"updated_at": "2023-11-03T09:56:20Z",
"updated_at": "2023-11-13T16:25:49Z",
"pushed_at": "2021-03-09T16:56:09Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -446,7 +446,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 12
},

View file

@ -475,13 +475,13 @@
"stargazers_count": 896,
"watchers_count": 896,
"has_discussions": false,
"forks_count": 242,
"forks_count": 243,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 242,
"forks": 243,
"watchers": 896,
"score": 0,
"subscribers_count": 27

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-11-11T14:51:59Z",
"updated_at": "2023-11-13T14:48:19Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 904,
"watchers_count": 904,
"stargazers_count": 905,
"watchers_count": 905,
"has_discussions": false,
"forks_count": 175,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 175,
"watchers": 904,
"watchers": 905,
"score": 0,
"subscribers_count": 14
},

View file

@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-11-09T09:22:47Z",
"updated_at": "2023-11-13T15:34:09Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 740,
"watchers_count": 740,
"stargazers_count": 741,
"watchers_count": 741,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 116,
"watchers": 740,
"watchers": 741,
"score": 0,
"subscribers_count": 10
},
@ -12333,5 +12333,43 @@
"watchers": 9,
"score": 0,
"subscribers_count": 0
},
{
"id": 718233980,
"name": "CVE-2021-44228",
"full_name": "LucasPDiniz\/CVE-2021-44228",
"owner": {
"login": "LucasPDiniz",
"id": 57265360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
"html_url": "https:\/\/github.com\/LucasPDiniz"
},
"html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-44228",
"description": "Log4j Vulnerability RCE - CVE-2021-44228",
"fork": false,
"created_at": "2023-11-13T16:57:22Z",
"updated_at": "2023-11-13T17:09:40Z",
"pushed_at": "2023-11-13T17:09:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"2021",
"cve-2021-44228",
"log4j",
"rce",
"solaris",
"solr",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2323,36 +2323,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 585137919,
"name": "Dirty-Pipe-CVE-2022-0847-POCs",
"full_name": "ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
"owner": {
"login": "ajith737",
"id": 72512571,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
"html_url": "https:\/\/github.com\/ajith737"
},
"html_url": "https:\/\/github.com\/ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
"description": null,
"fork": false,
"created_at": "2023-01-04T12:17:12Z",
"updated_at": "2023-01-04T12:17:19Z",
"pushed_at": "2023-01-04T12:51:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 592661297,
"name": "CVE-2022-0847",

View file

@ -94,35 +94,5 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 594762176,
"name": "CVE-2022-1329",
"full_name": "dexit\/CVE-2022-1329",
"owner": {
"login": "dexit",
"id": 6205151,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6205151?v=4",
"html_url": "https:\/\/github.com\/dexit"
},
"html_url": "https:\/\/github.com\/dexit\/CVE-2022-1329",
"description": "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~\/core\/app\/modules\/onboarding\/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to o CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-29T15:13:34Z",
"updated_at": "2023-02-20T12:39:20Z",
"pushed_at": "2022-12-28T12:11:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 584611982,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20470",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
"description": null,
"fork": false,
"created_at": "2023-01-03T03:54:59Z",
"updated_at": "2023-03-27T01:47:22Z",
"pushed_at": "2023-01-03T04:01:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,62 +0,0 @@
[
{
"id": 584289667,
"name": "frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"description": null,
"fork": false,
"created_at": "2023-01-02T05:55:37Z",
"updated_at": "2023-01-02T05:55:37Z",
"pushed_at": null,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 584624006,
"name": "frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"description": null,
"fork": false,
"created_at": "2023-01-03T04:51:12Z",
"updated_at": "2023-01-03T04:53:10Z",
"pushed_at": "2023-01-03T04:53:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 598379401,
"name": "CVE-2022-20607",
"full_name": "sumeetIT\/CVE-2022-20607",
"owner": {
"login": "sumeetIT",
"id": 54736912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54736912?v=4",
"html_url": "https:\/\/github.com\/sumeetIT"
},
"html_url": "https:\/\/github.com\/sumeetIT\/CVE-2022-20607",
"description": "In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N\/A CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-02-07T01:28:29Z",
"updated_at": "2023-02-20T12:01:39Z",
"pushed_at": "2022-12-27T12:10:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2023-11-03T07:59:06Z",
"updated_at": "2023-11-13T15:06:15Z",
"pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 339,
"watchers_count": 339,
"stargazers_count": 340,
"watchers_count": 340,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 107,
"watchers": 339,
"watchers": 340,
"score": 0,
"subscribers_count": 18
},
@ -2109,36 +2109,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 584868904,
"name": "Spring4Shell-CVE-2022-22965-POC",
"full_name": "ajith737\/Spring4Shell-CVE-2022-22965-POC",
"owner": {
"login": "ajith737",
"id": 72512571,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
"html_url": "https:\/\/github.com\/ajith737"
},
"html_url": "https:\/\/github.com\/ajith737\/Spring4Shell-CVE-2022-22965-POC",
"description": "User friendly Spring4Shell POC",
"fork": false,
"created_at": "2023-01-03T18:15:07Z",
"updated_at": "2023-01-03T18:15:14Z",
"pushed_at": "2023-01-03T18:53:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 608448692,
"name": "CVE-2022-22965",

View file

@ -58,35 +58,5 @@
"watchers": 23,
"score": 0,
"subscribers_count": 3
},
{
"id": 609374925,
"name": "CVE-2022-28346",
"full_name": "vincentinttsh\/CVE-2022-28346",
"owner": {
"login": "vincentinttsh",
"id": 14941597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941597?v=4",
"html_url": "https:\/\/github.com\/vincentinttsh"
},
"html_url": "https:\/\/github.com\/vincentinttsh\/CVE-2022-28346",
"description": "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.",
"fork": false,
"created_at": "2023-03-04T01:43:58Z",
"updated_at": "2022-08-24T08:06:59Z",
"pushed_at": "2022-05-15T00:53:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Foxit PDF Reader Remote Code Execution Exploit",
"fork": false,
"created_at": "2022-12-02T18:52:20Z",
"updated_at": "2023-11-05T06:49:36Z",
"updated_at": "2023-11-13T13:49:34Z",
"pushed_at": "2023-02-27T04:53:11Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -36,38 +36,8 @@
],
"visibility": "public",
"forks": 26,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 2
},
{
"id": 584971290,
"name": "CVE-2022-28672",
"full_name": "fastmo\/CVE-2022-28672",
"owner": {
"login": "fastmo",
"id": 53575270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
"html_url": "https:\/\/github.com\/fastmo"
},
"html_url": "https:\/\/github.com\/fastmo\/CVE-2022-28672",
"description": " CVE-2022-28672 Vulnerabilidad Foxit PDF Reader - UaF - RCE - JIT Spraying",
"fork": false,
"created_at": "2023-01-04T01:39:04Z",
"updated_at": "2023-01-04T02:03:45Z",
"pushed_at": "2023-01-04T02:04:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 594668634,
"name": "CVE-2022-29170",
"full_name": "yijikeji\/CVE-2022-29170",
"owner": {
"login": "yijikeji",
"id": 42433368,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42433368?v=4",
"html_url": "https:\/\/github.com\/yijikeji"
},
"html_url": "https:\/\/github.com\/yijikeji\/CVE-2022-29170",
"description": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesnt call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-29T09:10:44Z",
"updated_at": "2023-02-20T13:57:30Z",
"pushed_at": "2022-12-29T07:40:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-11-11T01:51:32Z",
"updated_at": "2023-11-13T15:12:56Z",
"pushed_at": "2023-11-05T13:34:13Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": true,
"forks_count": 19,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml",
"fork": false,
"created_at": "2022-10-31T13:24:34Z",
"updated_at": "2023-09-29T23:48:54Z",
"updated_at": "2023-11-13T14:48:00Z",
"pushed_at": "2023-02-08T17:24:05Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 4
}

View file

@ -1,32 +0,0 @@
[
{
"id": 590734045,
"name": "CVE-2022-40363",
"full_name": "Olafdaf\/CVE-2022-40363",
"owner": {
"login": "Olafdaf",
"id": 123042506,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123042506?v=4",
"html_url": "https:\/\/github.com\/Olafdaf"
},
"html_url": "https:\/\/github.com\/Olafdaf\/CVE-2022-40363",
"description": "A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-19T04:19:42Z",
"updated_at": "2023-09-06T21:52:46Z",
"pushed_at": "2022-12-29T11:12:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 594246349,
"name": "CVE-2022-40769",
"full_name": "PLSRcoin\/CVE-2022-40769",
"owner": {
"login": "PLSRcoin",
"id": 99826299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99826299?v=4",
"html_url": "https:\/\/github.com\/PLSRcoin"
},
"html_url": "https:\/\/github.com\/PLSRcoin\/CVE-2022-40769",
"description": "profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-28T00:12:31Z",
"updated_at": "2023-02-20T14:52:04Z",
"pushed_at": "2022-12-29T15:29:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -103,10 +103,10 @@
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
"fork": false,
"created_at": "2022-12-22T09:35:26Z",
"updated_at": "2023-10-26T07:28:04Z",
"updated_at": "2023-11-13T13:40:41Z",
"pushed_at": "2023-01-10T08:09:36Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -123,7 +123,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,32 +0,0 @@
[
{
"id": 584184679,
"name": "CVE-2022-41114",
"full_name": "gmh5225\/CVE-2022-41114",
"owner": {
"login": "gmh5225",
"id": 13917777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
"html_url": "https:\/\/github.com\/gmh5225"
},
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-41114",
"description": "Windows Bind Filter Driver Elevation of Privilege Vulnerability. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-01T18:30:30Z",
"updated_at": "2023-02-20T12:35:54Z",
"pushed_at": "2022-12-28T09:34:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 585251034,
"name": "CVE-2022-45728",
"full_name": "sudoninja-noob\/CVE-2022-45728",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45728",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:41:57Z",
"updated_at": "2023-01-04T17:41:57Z",
"pushed_at": "2023-01-04T17:43:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -89,44 +89,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 584490516,
"name": "CVE-2022-46169",
"full_name": "Inplex-sys\/CVE-2022-46169",
"owner": {
"login": "Inplex-sys",
"id": 69421356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
"html_url": "https:\/\/github.com\/Inplex-sys"
},
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
"description": "Cacti Unauthenticated Command Injection",
"fork": false,
"created_at": "2023-01-02T18:03:26Z",
"updated_at": "2023-03-11T00:41:32Z",
"pushed_at": "2023-01-02T18:05:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
"cve",
"hgrab-framework",
"poc",
"rce",
"scanner",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 585629170,
"name": "CVE-2022-46169",

View file

@ -1,34 +0,0 @@
[
{
"id": 584613908,
"name": "CVE-2022-46366",
"full_name": "wh-gov\/CVE-2022-46366",
"owner": {
"login": "wh-gov",
"id": 120082360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120082360?v=4",
"html_url": "https:\/\/github.com\/wh-gov"
},
"html_url": "https:\/\/github.com\/wh-gov\/CVE-2022-46366",
"description": "CVE-2022-46366",
"fork": false,
"created_at": "2023-01-03T04:04:29Z",
"updated_at": "2023-01-03T06:39:52Z",
"pushed_at": "2023-01-03T06:40:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"n"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2022-46463(Harbor 未授权)",
"fork": false,
"created_at": "2023-01-17T14:58:14Z",
"updated_at": "2023-10-31T05:45:22Z",
"updated_at": "2023-11-13T17:19:31Z",
"pushed_at": "2023-01-19T12:47:21Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,32 +0,0 @@
[
{
"id": 584354205,
"name": "CVE-2022-48197",
"full_name": "ryan412\/CVE-2022-48197",
"owner": {
"login": "ryan412",
"id": 54446262,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54446262?v=4",
"html_url": "https:\/\/github.com\/ryan412"
},
"html_url": "https:\/\/github.com\/ryan412\/CVE-2022-48197",
"description": null,
"fork": false,
"created_at": "2023-01-02T10:27:04Z",
"updated_at": "2023-01-02T10:27:04Z",
"pushed_at": "2023-01-02T10:31:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 49,
"score": 0,
"subscribers_count": 1

View file

@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false,
"created_at": "2023-10-11T08:42:17Z",
"updated_at": "2023-11-13T12:37:27Z",
"updated_at": "2023-11-13T14:10:02Z",
"pushed_at": "2023-10-16T02:24:02Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 80,
"watchers": 82,
"score": 0,
"subscribers_count": 3
},

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-11-12T21:05:49Z",
"updated_at": "2023-11-13T17:13:36Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 223,
"watchers": 224,
"score": 0,
"subscribers_count": 4
}

View file

@ -268,35 +268,5 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 704219716,
"name": "FortiGate-CVE-2023-27997",
"full_name": "Aicks\/FortiGate-CVE-2023-27997",
"owner": {
"login": "Aicks",
"id": 147735407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147735407?v=4",
"html_url": "https:\/\/github.com\/Aicks"
},
"html_url": "https:\/\/github.com\/Aicks\/FortiGate-CVE-2023-27997",
"description": "FortiGate exploit CVE-2023-27997",
"fork": false,
"created_at": "2023-10-12T19:43:46Z",
"updated_at": "2023-10-12T19:43:47Z",
"pushed_at": "2023-10-12T19:44:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 29,
"watchers": 107,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "PoC repository for CVE-2023-29007",
"fork": false,
"created_at": "2023-04-26T14:00:11Z",
"updated_at": "2023-09-28T11:46:01Z",
"updated_at": "2023-11-13T18:34:58Z",
"pushed_at": "2023-04-26T14:21:51Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3124 PoC",
"fork": false,
"created_at": "2023-09-05T12:32:50Z",
"updated_at": "2023-10-16T11:36:54Z",
"updated_at": "2023-11-13T17:01:52Z",
"pushed_at": "2023-09-05T15:58:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -398,36 +398,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 704117023,
"name": "Citrix-CVE-2023-3519",
"full_name": "Aicks\/Citrix-CVE-2023-3519",
"owner": {
"login": "Aicks",
"id": 147735407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147735407?v=4",
"html_url": "https:\/\/github.com\/Aicks"
},
"html_url": "https:\/\/github.com\/Aicks\/Citrix-CVE-2023-3519",
"description": "exploit CVE-2023-3519",
"fork": false,
"created_at": "2023-10-12T15:11:55Z",
"updated_at": "2023-10-12T19:45:03Z",
"pushed_at": "2023-10-12T15:13:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 710927225,
"name": "CVE-2023-3519",

View file

@ -45,10 +45,10 @@
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
"fork": false,
"created_at": "2023-09-26T17:56:55Z",
"updated_at": "2023-11-12T17:42:51Z",
"updated_at": "2023-11-13T16:01:46Z",
"pushed_at": "2023-09-26T19:02:07Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -62,35 +62,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 704998432,
"name": "CVE-2023-3710",
"full_name": "CwEeR313\/CVE-2023-3710",
"owner": {
"login": "CwEeR313",
"id": 147943631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147943631?v=4",
"html_url": "https:\/\/github.com\/CwEeR313"
},
"html_url": "https:\/\/github.com\/CwEeR313\/CVE-2023-3710",
"description": "exploit for CVE-2023-3710",
"fork": false,
"created_at": "2023-10-14T18:31:51Z",
"updated_at": "2023-10-18T07:20:44Z",
"pushed_at": "2023-10-14T21:24:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 718237903,
"name": "CVE-2023-41064",
"full_name": "MrR0b0t19\/CVE-2023-41064",
"owner": {
"login": "MrR0b0t19",
"id": 63489501,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4",
"html_url": "https:\/\/github.com\/MrR0b0t19"
},
"html_url": "https:\/\/github.com\/MrR0b0t19\/CVE-2023-41064",
"description": null,
"fork": false,
"created_at": "2023-11-13T17:07:02Z",
"updated_at": "2023-11-13T17:07:15Z",
"pushed_at": "2023-11-13T17:07:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC and Writeup for CVE-2023-46404.",
"fork": false,
"created_at": "2023-10-26T15:01:32Z",
"updated_at": "2023-11-03T16:30:16Z",
"updated_at": "2023-11-13T18:42:18Z",
"pushed_at": "2023-10-28T17:53:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2023-11-13T08:15:51Z",
"updated_at": "2023-11-13T14:19:04Z",
"pushed_at": "2023-11-03T12:50:06Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 142,
"watchers": 143,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "exploit for cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2023-11-13T10:09:32Z",
"updated_at": "2023-11-13T14:40:23Z",
"pushed_at": "2023-11-10T02:12:38Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2023-11-13T06:02:20Z",
"updated_at": "2023-11-13T13:16:52Z",
"pushed_at": "2023-10-05T23:33:49Z",
"stargazers_count": 253,
"watchers_count": 253,
"stargazers_count": 254,
"watchers_count": 254,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 253,
"watchers": 254,
"score": 0,
"subscribers_count": 13
},

View file

@ -317,10 +317,10 @@
"description": "Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit ",
"fork": false,
"created_at": "2023-10-28T20:05:30Z",
"updated_at": "2023-11-02T23:17:58Z",
"updated_at": "2023-11-13T15:52:03Z",
"pushed_at": "2023-10-29T16:47:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -329,7 +329,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -348,7 +348,7 @@
"fork": false,
"created_at": "2023-11-08T09:34:04Z",
"updated_at": "2023-11-13T08:09:54Z",
"pushed_at": "2023-11-08T09:40:31Z",
"pushed_at": "2023-11-13T14:59:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -243,10 +243,10 @@
"description": "An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability",
"fork": false,
"created_at": "2023-10-29T15:31:37Z",
"updated_at": "2023-11-06T12:23:51Z",
"updated_at": "2023-11-13T14:38:39Z",
"pushed_at": "2023-10-29T17:43:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -255,7 +255,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
@ -241,7 +241,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -249,7 +249,7 @@
"cve-2023-5360"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

32
2023/CVE-2023-5965.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 554898866,
"name": "cve-2023-5965",
"full_name": "pedrojosenavasperez\/cve-2023-5965",
"owner": {
"login": "pedrojosenavasperez",
"id": 115498883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115498883?v=4",
"html_url": "https:\/\/github.com\/pedrojosenavasperez"
},
"html_url": "https:\/\/github.com\/pedrojosenavasperez\/cve-2023-5965",
"description": null,
"fork": false,
"created_at": "2022-10-20T15:35:07Z",
"updated_at": "2023-11-13T17:27:18Z",
"pushed_at": "2023-11-13T17:26:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-5966.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 554819475,
"name": "cve-2023-5966",
"full_name": "pedrojosenavasperez\/cve-2023-5966",
"owner": {
"login": "pedrojosenavasperez",
"id": 115498883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115498883?v=4",
"html_url": "https:\/\/github.com\/pedrojosenavasperez"
},
"html_url": "https:\/\/github.com\/pedrojosenavasperez\/cve-2023-5966",
"description": null,
"fork": false,
"created_at": "2022-10-20T13:00:10Z",
"updated_at": "2023-11-13T17:25:12Z",
"pushed_at": "2023-11-13T17:24:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -576,7 +576,6 @@
- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
- [Chocapikk/CVE-2023-3519](https://github.com/Chocapikk/CVE-2023-3519)
- [JonaNeidhart/CVE-2023-3519-BackdoorCheck](https://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheck)
- [Aicks/Citrix-CVE-2023-3519](https://github.com/Aicks/Citrix-CVE-2023-3519)
- [Mohammaddvd/CVE-2023-3519](https://github.com/Mohammaddvd/CVE-2023-3519)
### CVE-2023-3640 (2023-07-24)
@ -593,7 +592,6 @@
- [vpxuser/CVE-2023-3710-POC](https://github.com/vpxuser/CVE-2023-3710-POC)
- [Mahdi22228/CVE-2023-3710](https://github.com/Mahdi22228/CVE-2023-3710)
- [CwEeR313/CVE-2023-3710](https://github.com/CwEeR313/CVE-2023-3710)
### CVE-2023-3711 (2023-09-12)
@ -905,6 +903,12 @@
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
### CVE-2023-5965
- [pedrojosenavasperez/cve-2023-5965](https://github.com/pedrojosenavasperez/cve-2023-5965)
### CVE-2023-5966
- [pedrojosenavasperez/cve-2023-5966](https://github.com/pedrojosenavasperez/cve-2023-5966)
### CVE-2023-20025 (2023-01-20)
<code>A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device. This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device.
@ -2080,7 +2084,6 @@
- [Cyb3rEnthusiast/CVE-2023-27997](https://github.com/Cyb3rEnthusiast/CVE-2023-27997)
- [lexfo/xortigate-cve-2023-27997](https://github.com/lexfo/xortigate-cve-2023-27997)
- [delsploit/CVE-2023-27997](https://github.com/delsploit/CVE-2023-27997)
- [Aicks/FortiGate-CVE-2023-27997](https://github.com/Aicks/FortiGate-CVE-2023-27997)
### CVE-2023-28121 (2023-04-12)
@ -4246,6 +4249,7 @@
</code>
- [MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064](https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064)
- [MrR0b0t19/CVE-2023-41064](https://github.com/MrR0b0t19/CVE-2023-41064)
### CVE-2023-41080 (2023-08-25)
@ -5429,7 +5433,6 @@
- [qwert419/linux-](https://github.com/qwert419/linux-)
- [DataFox/CVE-2022-0847](https://github.com/DataFox/CVE-2022-0847)
- [pmihsan/Dirty-Pipe-CVE-2022-0847](https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847)
- [ajith737/Dirty-Pipe-CVE-2022-0847-POCs](https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs)
- [mutur4/CVE-2022-0847](https://github.com/mutur4/CVE-2022-0847)
- [orsuprasad/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits)
- [4bhishek0/CVE-2022-0847-Poc](https://github.com/4bhishek0/CVE-2022-0847-Poc)
@ -5618,7 +5621,6 @@
- [AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit](https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit)
- [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329)
- [Grazee/CVE-2022-1329-WordPress-Elementor-RCE](https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE)
- [dexit/CVE-2022-1329](https://github.com/dexit/CVE-2022-1329)
### CVE-2022-1386 (2022-05-16)
@ -6274,21 +6276,6 @@
- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456)
### CVE-2022-20470 (2022-12-13)
<code>In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234013191
</code>
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470)
### CVE-2022-20473 (2022-12-13)
<code>In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
</code>
- [Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473)
- [Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473)
### CVE-2022-20489 (2023-01-24)
<code>In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703460
@ -6325,13 +6312,6 @@
- [Supersonic/CVE-2022-20494](https://github.com/Supersonic/CVE-2022-20494)
### CVE-2022-20607 (2022-12-16)
<code>In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A
</code>
- [sumeetIT/CVE-2022-20607](https://github.com/sumeetIT/CVE-2022-20607)
### CVE-2022-20699 (2022-02-10)
<code>Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
@ -6945,7 +6925,6 @@
- [clemoregan/SSE4-CVE-2022-22965](https://github.com/clemoregan/SSE4-CVE-2022-22965)
- [devengpk/CVE-2022-22965](https://github.com/devengpk/CVE-2022-22965)
- [zangcc/CVE-2022-22965-rexbb](https://github.com/zangcc/CVE-2022-22965-rexbb)
- [ajith737/Spring4Shell-CVE-2022-22965-POC](https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC)
- [c33dd/CVE-2022-22965](https://github.com/c33dd/CVE-2022-22965)
- [gokul-ramesh/Spring4Shell-PoC-exploit](https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit)
- [bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-](https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-)
@ -8241,7 +8220,6 @@
- [YouGina/CVE-2022-28346](https://github.com/YouGina/CVE-2022-28346)
- [DeEpinGh0st/CVE-2022-28346](https://github.com/DeEpinGh0st/CVE-2022-28346)
- [vincentinttsh/CVE-2022-28346](https://github.com/vincentinttsh/CVE-2022-28346)
### CVE-2022-28368 (2022-04-02)
@ -8307,7 +8285,6 @@
</code>
- [hacksysteam/CVE-2022-28672](https://github.com/hacksysteam/CVE-2022-28672)
- [fastmo/CVE-2022-28672](https://github.com/fastmo/CVE-2022-28672)
### CVE-2022-28943
- [zhefox/CVE-2022-28943](https://github.com/zhefox/CVE-2022-28943)
@ -8393,13 +8370,6 @@
- [EgeBalci/CVE-2022-29154](https://github.com/EgeBalci/CVE-2022-29154)
### CVE-2022-29170 (2022-05-20)
<code>Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesnt call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.
</code>
- [yijikeji/CVE-2022-29170](https://github.com/yijikeji/CVE-2022-29170)
### CVE-2022-29221 (2022-05-24)
<code>Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
@ -10123,13 +10093,6 @@
- [h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated](https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated)
### CVE-2022-40363 (2022-09-29)
<code>A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.
</code>
- [Olafdaf/CVE-2022-40363](https://github.com/Olafdaf/CVE-2022-40363)
### CVE-2022-40470 (2022-11-21)
<code>Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.
@ -10197,13 +10160,6 @@
- [williamkhepri/CVE-2022-40687-metasploit-scanner](https://github.com/williamkhepri/CVE-2022-40687-metasploit-scanner)
### CVE-2022-40769 (2022-09-18)
<code>profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
</code>
- [PLSRcoin/CVE-2022-40769](https://github.com/PLSRcoin/CVE-2022-40769)
### CVE-2022-40799 (2022-11-28)
<code>Data Integrity Failure in 'Backup Config' in D-Link DNR-322L &lt;= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
@ -10286,13 +10242,6 @@
- [g-gill24/WinRE-Patch](https://github.com/g-gill24/WinRE-Patch)
- [dsn1321/KB5025175-CVE-2022-41099](https://github.com/dsn1321/KB5025175-CVE-2022-41099)
### CVE-2022-41114 (2022-11-09)
<code>Windows Bind Filter Driver Elevation of Privilege Vulnerability
</code>
- [gmh5225/CVE-2022-41114](https://github.com/gmh5225/CVE-2022-41114)
### CVE-2022-41218 (2022-09-21)
<code>In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
@ -10980,13 +10929,6 @@
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
### CVE-2022-45728 (2023-01-12)
<code>Doctor Appointment Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability.
</code>
- [sudoninja-noob/CVE-2022-45728](https://github.com/sudoninja-noob/CVE-2022-45728)
### CVE-2022-45729 (2023-01-12)
<code>A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Employee ID parameter.
@ -11071,7 +11013,6 @@
- [imjdl/CVE-2022-46169](https://github.com/imjdl/CVE-2022-46169)
- [0xf4n9x/CVE-2022-46169](https://github.com/0xf4n9x/CVE-2022-46169)
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
- [botfather0x0/CVE-2022-46169](https://github.com/botfather0x0/CVE-2022-46169)
- [Habib0x0/CVE-2022-46169](https://github.com/Habib0x0/CVE-2022-46169)
@ -11108,13 +11049,6 @@
### CVE-2022-46196
- [dpgg101/CVE-2022-46196](https://github.com/dpgg101/CVE-2022-46196)
### CVE-2022-46366 (2022-12-02)
<code>** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.
</code>
- [wh-gov/CVE-2022-46366](https://github.com/wh-gov/CVE-2022-46366)
### CVE-2022-46381 (2022-12-13)
<code>Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
@ -11299,13 +11233,6 @@
- [otsmr/internet-of-vulnerable-things](https://github.com/otsmr/internet-of-vulnerable-things)
### CVE-2022-48197 (2023-01-02)
<code>** UNSUPPORTED WHEN ASSIGNED ** Reflected cross-site scripting (XSS) exists in the TreeView of YUI2 through 2800: up.php sam.php renderhidden.php removechildren.php removeall.php readd.php overflow.php newnode2.php newnode.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
</code>
- [ryan412/CVE-2022-48197](https://github.com/ryan412/CVE-2022-48197)
### CVE-2022-48311 (2023-02-06)
<code>**UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
@ -17369,6 +17296,7 @@
- [MrHarshvardhan/PY-Log4j-RCE-Scanner](https://github.com/MrHarshvardhan/PY-Log4j-RCE-Scanner)
- [Muhammad-Ali007/Log4j_CVE-2021-44228](https://github.com/Muhammad-Ali007/Log4j_CVE-2021-44228)
- [Tai-e/CVE-2021-44228](https://github.com/Tai-e/CVE-2021-44228)
- [LucasPDiniz/CVE-2021-44228](https://github.com/LucasPDiniz/CVE-2021-44228)
### CVE-2021-44255 (2022-01-31)
@ -37157,6 +37085,7 @@
</code>
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)
- [Rodney-O-C-Melby/dns-zone-transfer-test](https://github.com/Rodney-O-C-Melby/dns-zone-transfer-test)
### CVE-1999-1053 (2001-09-12)