Auto Update 2023/12/28 18:39:40

This commit is contained in:
motikan2010-bot 2023-12-29 03:39:40 +09:00
parent e1b5b95caa
commit abfd8e9df2
37 changed files with 218 additions and 148 deletions

32
2006/CVE-2006-2842.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 736683121,
"name": "CVE-2006-2842",
"full_name": "karthi-the-hacker\/CVE-2006-2842",
"owner": {
"login": "karthi-the-hacker",
"id": 33289300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
"html_url": "https:\/\/github.com\/karthi-the-hacker"
},
"html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842",
"description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
"fork": false,
"created_at": "2023-12-28T15:17:56Z",
"updated_at": "2023-12-28T15:20:03Z",
"pushed_at": "2023-12-28T15:24:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,12 +43,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z",
"updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857,
"watchers_count": 1857,
"stargazers_count": 1859,
"watchers_count": 1859,
"has_discussions": false,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -75,8 +75,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 1857,
"forks": 340,
"watchers": 1859,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,12 +13,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z",
"updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857,
"watchers_count": 1857,
"stargazers_count": 1859,
"watchers_count": 1859,
"has_discussions": false,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -45,8 +45,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 1857,
"forks": 340,
"watchers": 1859,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false,
"created_at": "2017-10-09T15:13:25Z",
"updated_at": "2023-12-14T13:29:19Z",
"updated_at": "2023-12-28T17:10:03Z",
"pushed_at": "2021-07-29T12:00:48Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 11
},

View file

@ -43,12 +43,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z",
"updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857,
"watchers_count": 1857,
"stargazers_count": 1859,
"watchers_count": 1859,
"has_discussions": false,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -75,8 +75,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 1857,
"forks": 340,
"watchers": 1859,
"score": 0,
"subscribers_count": 35
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 2,
"score": 0,
"subscribers_count": 0

View file

@ -587,12 +587,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z",
"updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857,
"watchers_count": 1857,
"stargazers_count": 1859,
"watchers_count": 1859,
"has_discussions": false,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -619,8 +619,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 1857,
"forks": 340,
"watchers": 1859,
"score": 0,
"subscribers_count": 35
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 347,
"watchers_count": 347,
"has_discussions": false,
"forks_count": 84,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 84,
"forks": 83,
"watchers": 347,
"score": 0,
"subscribers_count": 12

View file

@ -193,12 +193,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z",
"updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857,
"watchers_count": 1857,
"stargazers_count": 1859,
"watchers_count": 1859,
"has_discussions": false,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -225,8 +225,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 1857,
"forks": 340,
"watchers": 1859,
"score": 0,
"subscribers_count": 35
}

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2023-12-28T03:28:33Z",
"updated_at": "2023-12-28T13:09:42Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 628,
"watchers_count": 628,
"stargazers_count": 629,
"watchers_count": 629,
"has_discussions": false,
"forks_count": 172,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 628,
"watchers": 629,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,12 +13,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z",
"updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857,
"watchers_count": 1857,
"stargazers_count": 1859,
"watchers_count": 1859,
"has_discussions": false,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -45,8 +45,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 1857,
"forks": 340,
"watchers": 1859,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)",
"fork": false,
"created_at": "2020-08-13T09:03:40Z",
"updated_at": "2023-12-08T01:45:58Z",
"updated_at": "2023-12-28T12:31:34Z",
"pushed_at": "2023-09-19T10:38:28Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 49,
"watchers": 48,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
"fork": false,
"created_at": "2020-12-01T16:58:39Z",
"updated_at": "2021-12-16T10:30:25Z",
"updated_at": "2023-12-28T16:33:55Z",
"pushed_at": "2021-12-31T12:02:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 28
},

View file

@ -172,10 +172,10 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2023-12-20T04:04:07Z",
"updated_at": "2023-12-28T17:43:01Z",
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 332,
"watchers_count": 332,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -193,7 +193,7 @@
],
"visibility": "public",
"forks": 79,
"watchers": 331,
"watchers": 332,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2023-12-26T21:27:42Z",
"updated_at": "2023-12-28T16:20:08Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 255,
"watchers": 256,
"score": 0,
"subscribers_count": 14
},
@ -347,10 +347,10 @@
"description": "Laravel RCE (CVE-2021-3129)",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2023-12-28T07:19:50Z",
"updated_at": "2023-12-28T16:36:00Z",
"pushed_at": "2023-11-22T09:28:49Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -368,7 +368,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 1
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-12-20T04:06:03Z",
"updated_at": "2023-12-28T16:02:46Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1496,
"watchers_count": 1496,
"stargazers_count": 1497,
"watchers_count": 1497,
"has_discussions": false,
"forks_count": 490,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 490,
"watchers": 1496,
"watchers": 1497,
"score": 0,
"subscribers_count": 28
},
@ -523,10 +523,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2023-12-25T07:25:06Z",
"updated_at": "2023-12-28T16:02:49Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 765,
"watchers_count": 765,
"stargazers_count": 766,
"watchers_count": 766,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -542,7 +542,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 765,
"watchers": 766,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
"fork": false,
"created_at": "2023-11-14T11:32:36Z",
"updated_at": "2023-12-27T11:50:11Z",
"updated_at": "2023-12-28T18:03:55Z",
"pushed_at": "2023-12-22T11:29:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -919,10 +919,10 @@
"description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用",
"fork": false,
"created_at": "2022-04-02T09:13:54Z",
"updated_at": "2023-12-28T08:36:18Z",
"updated_at": "2023-12-28T15:17:22Z",
"pushed_at": "2022-04-02T10:14:11Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -931,7 +931,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
"updated_at": "2023-12-12T08:17:04Z",
"updated_at": "2023-12-28T13:20:31Z",
"pushed_at": "2022-12-18T03:36:03Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
"updated_at": "2023-12-27T09:57:09Z",
"updated_at": "2023-12-28T14:04:01Z",
"pushed_at": "2022-09-06T14:05:22Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 242,
"forks": 39,
"watchers": 241,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-12-28T02:38:52Z",
"updated_at": "2023-12-28T17:15:24Z",
"pushed_at": "2023-12-01T16:28:38Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": true,
"forks_count": 20,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 137,
"watchers": 138,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,17 +14,17 @@
"fork": false,
"created_at": "2023-04-13T02:56:24Z",
"updated_at": "2023-04-13T02:56:31Z",
"pushed_at": "2023-04-13T06:32:28Z",
"pushed_at": "2023-12-28T14:49:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "A proof of concept for CVE-20231326 in apport-cli 2.26.0",
"fork": false,
"created_at": "2023-12-06T00:07:40Z",
"updated_at": "2023-12-24T21:16:14Z",
"updated_at": "2023-12-28T15:11:00Z",
"pushed_at": "2023-12-06T12:46:08Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -499,10 +499,10 @@
"description": "配合 CVE-2023-22515 后台上传jar包实现RCE",
"fork": false,
"created_at": "2023-11-09T12:55:25Z",
"updated_at": "2023-12-14T07:00:43Z",
"updated_at": "2023-12-28T18:31:49Z",
"pushed_at": "2023-11-09T14:21:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -511,7 +511,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-04T07:48:13Z",
"updated_at": "2023-12-27T10:01:35Z",
"updated_at": "2023-12-28T15:49:49Z",
"pushed_at": "2023-09-04T07:51:58Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
"fork": false,
"created_at": "2023-11-09T09:19:23Z",
"updated_at": "2023-12-24T08:44:47Z",
"updated_at": "2023-12-28T12:35:52Z",
"pushed_at": "2023-11-15T08:35:06Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 85,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-19T11:21:12Z",
"updated_at": "2023-12-24T18:04:12Z",
"updated_at": "2023-12-28T12:37:52Z",
"pushed_at": "2023-12-24T10:47:00Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis",
"fork": false,
"created_at": "2023-12-27T00:06:20Z",
"updated_at": "2023-12-28T01:51:17Z",
"updated_at": "2023-12-28T16:08:19Z",
"pushed_at": "2023-12-27T23:24:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -242,7 +242,7 @@
"fork": false,
"created_at": "2023-11-08T20:56:22Z",
"updated_at": "2023-12-21T07:11:51Z",
"pushed_at": "2023-12-25T09:18:20Z",
"pushed_at": "2023-12-28T16:12:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2023-12-27T11:17:24Z",
"updated_at": "2023-12-28T15:05:47Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 263,
"watchers_count": 263,
"stargazers_count": 264,
"watchers_count": 264,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 263,
"watchers": 264,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.",
"fork": false,
"created_at": "2023-12-22T06:50:28Z",
"updated_at": "2023-12-28T08:41:06Z",
"updated_at": "2023-12-28T14:35:25Z",
"pushed_at": "2023-12-22T06:59:34Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 3
}

View file

@ -208,5 +208,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 736713584,
"name": "CVE-2023-51385_test-star-main",
"full_name": "siyi-star\/CVE-2023-51385_test-star-main",
"owner": {
"login": "siyi-star",
"id": 60383315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60383315?v=4",
"html_url": "https:\/\/github.com\/siyi-star"
},
"html_url": "https:\/\/github.com\/siyi-star\/CVE-2023-51385_test-star-main",
"description": "CVE-2023-51385_test-star-main",
"fork": false,
"created_at": "2023-12-28T16:56:13Z",
"updated_at": "2023-12-28T16:56:13Z",
"pushed_at": "2023-12-28T17:40:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Postfix SMTP Smuggling - Expect Script POC",
"fork": false,
"created_at": "2023-12-26T17:02:20Z",
"updated_at": "2023-12-28T05:44:07Z",
"updated_at": "2023-12-28T14:28:30Z",
"pushed_at": "2023-12-26T20:16:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2023-12-13T20:26:59Z",
"updated_at": "2023-12-28T12:06:51Z",
"updated_at": "2023-12-28T12:45:25Z",
"pushed_at": "2023-12-15T18:13:06Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 1
},

View file

@ -6026,6 +6026,7 @@
- [zls1793/CVE-2023-51385_test](https://github.com/zls1793/CVE-2023-51385_test)
- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
- [zhulin2/testCVE-2023-51385](https://github.com/zhulin2/testCVE-2023-51385)
- [siyi-star/CVE-2023-51385_test-star-main](https://github.com/siyi-star/CVE-2023-51385_test-star-main)
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@ -17080,7 +17081,7 @@
### CVE-2021-41349 (2021-11-09)
<code>Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305.
<code>Microsoft Exchange Server Spoofing Vulnerability
</code>
- [exploit-io/CVE-2021-41349](https://github.com/exploit-io/CVE-2021-41349)
@ -17457,7 +17458,7 @@
### CVE-2021-42278 (2021-11-09)
<code>Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291.
<code>Active Directory Domain Services Elevation of Privilege Vulnerability
</code>
- [safebuffer/sam-the-admin](https://github.com/safebuffer/sam-the-admin)
@ -17468,7 +17469,7 @@
### CVE-2021-42287 (2021-11-09)
<code>Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291.
<code>Active Directory Domain Services Elevation of Privilege Vulnerability
</code>
- [cube0x0/noPac](https://github.com/cube0x0/noPac)
@ -38143,6 +38144,13 @@
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
### CVE-2006-2842 (2006-06-06)
<code>** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.
</code>
- [karthi-the-hacker/CVE-2006-2842](https://github.com/karthi-the-hacker/CVE-2006-2842)
### CVE-2006-3392 (2006-07-06)
<code>Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using &quot;..%01&quot; sequences, which bypass the removal of &quot;../&quot; sequences before bytes such as &quot;%01&quot; are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.