mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/12/28 18:39:40
This commit is contained in:
parent
e1b5b95caa
commit
abfd8e9df2
37 changed files with 218 additions and 148 deletions
32
2006/CVE-2006-2842.json
Normal file
32
2006/CVE-2006-2842.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 736683121,
|
||||
"name": "CVE-2006-2842",
|
||||
"full_name": "karthi-the-hacker\/CVE-2006-2842",
|
||||
"owner": {
|
||||
"login": "karthi-the-hacker",
|
||||
"id": 33289300,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
|
||||
"html_url": "https:\/\/github.com\/karthi-the-hacker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842",
|
||||
"description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-28T15:17:56Z",
|
||||
"updated_at": "2023-12-28T15:20:03Z",
|
||||
"pushed_at": "2023-12-28T15:24:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,12 +43,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-12-27T08:25:22Z",
|
||||
"updated_at": "2023-12-28T15:43:55Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"stargazers_count": 1859,
|
||||
"watchers_count": 1859,
|
||||
"has_discussions": false,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -75,8 +75,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 1857,
|
||||
"forks": 340,
|
||||
"watchers": 1859,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-12-27T08:25:22Z",
|
||||
"updated_at": "2023-12-28T15:43:55Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"stargazers_count": 1859,
|
||||
"watchers_count": 1859,
|
||||
"has_discussions": false,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,8 +45,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 1857,
|
||||
"forks": 340,
|
||||
"watchers": 1859,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2023-12-14T13:29:19Z",
|
||||
"updated_at": "2023-12-28T17:10:03Z",
|
||||
"pushed_at": "2021-07-29T12:00:48Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 128,
|
||||
"watchers": 129,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -43,12 +43,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-12-27T08:25:22Z",
|
||||
"updated_at": "2023-12-28T15:43:55Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"stargazers_count": 1859,
|
||||
"watchers_count": 1859,
|
||||
"has_discussions": false,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -75,8 +75,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 1857,
|
||||
"forks": 340,
|
||||
"watchers": 1859,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -587,12 +587,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-12-27T08:25:22Z",
|
||||
"updated_at": "2023-12-28T15:43:55Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"stargazers_count": 1859,
|
||||
"watchers_count": 1859,
|
||||
"has_discussions": false,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -619,8 +619,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 1857,
|
||||
"forks": 340,
|
||||
"watchers": 1859,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"forks": 83,
|
||||
"watchers": 347,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
|
|
|
@ -193,12 +193,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-12-27T08:25:22Z",
|
||||
"updated_at": "2023-12-28T15:43:55Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"stargazers_count": 1859,
|
||||
"watchers_count": 1859,
|
||||
"has_discussions": false,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -225,8 +225,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 1857,
|
||||
"forks": 340,
|
||||
"watchers": 1859,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2023-12-28T03:28:33Z",
|
||||
"updated_at": "2023-12-28T13:09:42Z",
|
||||
"pushed_at": "2022-01-05T04:09:42Z",
|
||||
"stargazers_count": 628,
|
||||
"watchers_count": 628,
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"has_discussions": false,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 628,
|
||||
"watchers": 629,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-12-27T08:25:22Z",
|
||||
"updated_at": "2023-12-28T15:43:55Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"stargazers_count": 1859,
|
||||
"watchers_count": 1859,
|
||||
"has_discussions": false,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,8 +45,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 1857,
|
||||
"forks": 340,
|
||||
"watchers": 1859,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T09:03:40Z",
|
||||
"updated_at": "2023-12-08T01:45:58Z",
|
||||
"updated_at": "2023-12-28T12:31:34Z",
|
||||
"pushed_at": "2023-09-19T10:38:28Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 49,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-01T16:58:39Z",
|
||||
"updated_at": "2021-12-16T10:30:25Z",
|
||||
"updated_at": "2023-12-28T16:33:55Z",
|
||||
"pushed_at": "2021-12-31T12:02:38Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -172,10 +172,10 @@
|
|||
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2023-12-20T04:04:07Z",
|
||||
"updated_at": "2023-12-28T17:43:01Z",
|
||||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -193,7 +193,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 331,
|
||||
"watchers": 332,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2023-12-26T21:27:42Z",
|
||||
"updated_at": "2023-12-28T16:20:08Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
@ -347,10 +347,10 @@
|
|||
"description": "Laravel RCE (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T17:22:55Z",
|
||||
"updated_at": "2023-12-28T07:19:50Z",
|
||||
"updated_at": "2023-12-28T16:36:00Z",
|
||||
"pushed_at": "2023-11-22T09:28:49Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -368,7 +368,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2023-12-20T04:06:03Z",
|
||||
"updated_at": "2023-12-28T16:02:46Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1496,
|
||||
"watchers_count": 1496,
|
||||
"stargazers_count": 1497,
|
||||
"watchers_count": 1497,
|
||||
"has_discussions": false,
|
||||
"forks_count": 490,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 490,
|
||||
"watchers": 1496,
|
||||
"watchers": 1497,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -523,10 +523,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2023-12-25T07:25:06Z",
|
||||
"updated_at": "2023-12-28T16:02:49Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"has_discussions": false,
|
||||
"forks_count": 173,
|
||||
"allow_forking": true,
|
||||
|
@ -542,7 +542,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"watchers": 765,
|
||||
"watchers": 766,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-14T11:32:36Z",
|
||||
"updated_at": "2023-12-27T11:50:11Z",
|
||||
"updated_at": "2023-12-28T18:03:55Z",
|
||||
"pushed_at": "2023-12-22T11:29:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -919,10 +919,10 @@
|
|||
"description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T09:13:54Z",
|
||||
"updated_at": "2023-12-28T08:36:18Z",
|
||||
"updated_at": "2023-12-28T15:17:22Z",
|
||||
"pushed_at": "2022-04-02T10:14:11Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -931,7 +931,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "HTTP3-attacks (CVE-2022-30592)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-06T09:57:43Z",
|
||||
"updated_at": "2023-12-12T08:17:04Z",
|
||||
"updated_at": "2023-12-28T13:20:31Z",
|
||||
"pushed_at": "2022-12-18T03:36:03Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T12:46:45Z",
|
||||
"updated_at": "2023-12-27T09:57:09Z",
|
||||
"updated_at": "2023-12-28T14:04:01Z",
|
||||
"pushed_at": "2022-09-06T14:05:22Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 242,
|
||||
"forks": 39,
|
||||
"watchers": 241,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-12-28T02:38:52Z",
|
||||
"updated_at": "2023-12-28T17:15:24Z",
|
||||
"pushed_at": "2023-12-01T16:28:38Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": true,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 137,
|
||||
"watchers": 138,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,17 +14,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-13T02:56:24Z",
|
||||
"updated_at": "2023-04-13T02:56:31Z",
|
||||
"pushed_at": "2023-04-13T06:32:28Z",
|
||||
"pushed_at": "2023-12-28T14:49:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept for CVE-2023–1326 in apport-cli 2.26.0",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-06T00:07:40Z",
|
||||
"updated_at": "2023-12-24T21:16:14Z",
|
||||
"updated_at": "2023-12-28T15:11:00Z",
|
||||
"pushed_at": "2023-12-06T12:46:08Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -499,10 +499,10 @@
|
|||
"description": "配合 CVE-2023-22515 后台上传jar包实现RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T12:55:25Z",
|
||||
"updated_at": "2023-12-14T07:00:43Z",
|
||||
"updated_at": "2023-12-28T18:31:49Z",
|
||||
"pushed_at": "2023-11-09T14:21:58Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -511,7 +511,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-04T07:48:13Z",
|
||||
"updated_at": "2023-12-27T10:01:35Z",
|
||||
"updated_at": "2023-12-28T15:49:49Z",
|
||||
"pushed_at": "2023-09-04T07:51:58Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 119,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T09:19:23Z",
|
||||
"updated_at": "2023-12-24T08:44:47Z",
|
||||
"updated_at": "2023-12-28T12:35:52Z",
|
||||
"pushed_at": "2023-11-15T08:35:06Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-19T11:21:12Z",
|
||||
"updated_at": "2023-12-24T18:04:12Z",
|
||||
"updated_at": "2023-12-28T12:37:52Z",
|
||||
"pushed_at": "2023-12-24T10:47:00Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-27T00:06:20Z",
|
||||
"updated_at": "2023-12-28T01:51:17Z",
|
||||
"updated_at": "2023-12-28T16:08:19Z",
|
||||
"pushed_at": "2023-12-27T23:24:43Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -242,7 +242,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-08T20:56:22Z",
|
||||
"updated_at": "2023-12-21T07:11:51Z",
|
||||
"pushed_at": "2023-12-25T09:18:20Z",
|
||||
"pushed_at": "2023-12-28T16:12:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2023-12-27T11:17:24Z",
|
||||
"updated_at": "2023-12-28T15:05:47Z",
|
||||
"pushed_at": "2023-12-18T04:25:00Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 263,
|
||||
"watchers": 264,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-22T06:50:28Z",
|
||||
"updated_at": "2023-12-28T08:41:06Z",
|
||||
"updated_at": "2023-12-28T14:35:25Z",
|
||||
"pushed_at": "2023-12-22T06:59:34Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -208,5 +208,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 736713584,
|
||||
"name": "CVE-2023-51385_test-star-main",
|
||||
"full_name": "siyi-star\/CVE-2023-51385_test-star-main",
|
||||
"owner": {
|
||||
"login": "siyi-star",
|
||||
"id": 60383315,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60383315?v=4",
|
||||
"html_url": "https:\/\/github.com\/siyi-star"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/siyi-star\/CVE-2023-51385_test-star-main",
|
||||
"description": "CVE-2023-51385_test-star-main",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-28T16:56:13Z",
|
||||
"updated_at": "2023-12-28T16:56:13Z",
|
||||
"pushed_at": "2023-12-28T17:40:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Postfix SMTP Smuggling - Expect Script POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-26T17:02:20Z",
|
||||
"updated_at": "2023-12-28T05:44:07Z",
|
||||
"updated_at": "2023-12-28T14:28:30Z",
|
||||
"pushed_at": "2023-12-26T20:16:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T20:26:59Z",
|
||||
"updated_at": "2023-12-28T12:06:51Z",
|
||||
"updated_at": "2023-12-28T12:45:25Z",
|
||||
"pushed_at": "2023-12-15T18:13:06Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
14
README.md
14
README.md
|
@ -6026,6 +6026,7 @@
|
|||
- [zls1793/CVE-2023-51385_test](https://github.com/zls1793/CVE-2023-51385_test)
|
||||
- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
|
||||
- [zhulin2/testCVE-2023-51385](https://github.com/zhulin2/testCVE-2023-51385)
|
||||
- [siyi-star/CVE-2023-51385_test-star-main](https://github.com/siyi-star/CVE-2023-51385_test-star-main)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
@ -17080,7 +17081,7 @@
|
|||
|
||||
### CVE-2021-41349 (2021-11-09)
|
||||
|
||||
<code>Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305.
|
||||
<code>Microsoft Exchange Server Spoofing Vulnerability
|
||||
</code>
|
||||
|
||||
- [exploit-io/CVE-2021-41349](https://github.com/exploit-io/CVE-2021-41349)
|
||||
|
@ -17457,7 +17458,7 @@
|
|||
|
||||
### CVE-2021-42278 (2021-11-09)
|
||||
|
||||
<code>Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291.
|
||||
<code>Active Directory Domain Services Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [safebuffer/sam-the-admin](https://github.com/safebuffer/sam-the-admin)
|
||||
|
@ -17468,7 +17469,7 @@
|
|||
|
||||
### CVE-2021-42287 (2021-11-09)
|
||||
|
||||
<code>Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291.
|
||||
<code>Active Directory Domain Services Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [cube0x0/noPac](https://github.com/cube0x0/noPac)
|
||||
|
@ -38143,6 +38144,13 @@
|
|||
|
||||
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
|
||||
|
||||
### CVE-2006-2842 (2006-06-06)
|
||||
|
||||
<code>** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.
|
||||
</code>
|
||||
|
||||
- [karthi-the-hacker/CVE-2006-2842](https://github.com/karthi-the-hacker/CVE-2006-2842)
|
||||
|
||||
### CVE-2006-3392 (2006-07-06)
|
||||
|
||||
<code>Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
|
||||
|
|
Loading…
Reference in a new issue