Auto Update 2023/12/10 12:39:22

This commit is contained in:
motikan2010-bot 2023-12-10 21:39:22 +09:00
parent 801ab0a6c0
commit ac936d78cb
30 changed files with 157 additions and 394 deletions

View file

@ -1,34 +1,4 @@
[
{
"id": 7481496,
"name": "diaggetroot",
"full_name": "hiikezoe\/diaggetroot",
"owner": {
"login": "hiikezoe",
"id": 188175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4",
"html_url": "https:\/\/github.com\/hiikezoe"
},
"html_url": "https:\/\/github.com\/hiikezoe\/diaggetroot",
"description": "Obtain root access through CVE-2012-4220",
"fork": false,
"created_at": "2013-01-07T11:45:35Z",
"updated_at": "2023-09-28T10:21:15Z",
"pushed_at": "2013-04-03T11:58:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 12,
"score": 0,
"subscribers_count": 4
},
{
"id": 11198771,
"name": "root-zte-open",

View file

@ -1,34 +1,4 @@
[
{
"id": 8106302,
"name": "MySQL-Fu.rb",
"full_name": "Hood3dRob1n\/MySQL-Fu.rb",
"owner": {
"login": "Hood3dRob1n",
"id": 1881344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881344?v=4",
"html_url": "https:\/\/github.com\/Hood3dRob1n"
},
"html_url": "https:\/\/github.com\/Hood3dRob1n\/MySQL-Fu.rb",
"description": "MySQL-Fu is a Ruby based MySQL Client Script I wrote. It does most of the stuff a normal MySQL client might do: SQL Shell, Update\/Delete\/Drop Database\/Table, Add\/Delete Users, Dump Database(s)\/Table w\/ option for gzip...... Plus a few extra options to make life a little easier for pentests. Includes Several builtin PHP Command Shell options as well as Pentestmonkey's PHP Reverse Shell, in addition to multiple options for file writing and reading (all files read logged locally for offline analysis later), also includes Ruby port of Kingcope's CVE-2012-5613 Linux MySQL Privilege Escalation Exploit.",
"fork": false,
"created_at": "2013-02-09T04:59:43Z",
"updated_at": "2023-06-21T15:30:06Z",
"pushed_at": "2013-02-09T05:02:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 3
},
{
"id": 137385853,
"name": "UDFPwn-CVE-2012-5613",

View file

@ -1,32 +0,0 @@
[
{
"id": 7420891,
"name": "rails-cve-2012-5664-test",
"full_name": "phusion\/rails-cve-2012-5664-test",
"owner": {
"login": "phusion",
"id": 830588,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/830588?v=4",
"html_url": "https:\/\/github.com\/phusion"
},
"html_url": "https:\/\/github.com\/phusion\/rails-cve-2012-5664-test",
"description": "Demo app showing how the Rails CVE-2013-5664 vulnerability works.",
"fork": false,
"created_at": "2013-01-03T10:07:27Z",
"updated_at": "2018-03-12T19:42:18Z",
"pushed_at": "2013-01-03T13:15:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 5
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 9437130,
"name": "vulnupnp",
"full_name": "lochiiconnectivity\/vulnupnp",
"owner": {
"login": "lochiiconnectivity",
"id": 4155305,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4",
"html_url": "https:\/\/github.com\/lochiiconnectivity"
},
"html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp",
"description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959",
"fork": false,
"created_at": "2013-04-14T23:34:56Z",
"updated_at": "2016-09-04T16:49:13Z",
"pushed_at": "2013-04-14T23:37:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -119,36 +119,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 188897438,
"name": "CVE-2013-0156",
"full_name": "R3dKn33-zz\/CVE-2013-0156",
"owner": {
"login": "R3dKn33-zz",
"id": 31809058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31809058?v=4",
"html_url": "https:\/\/github.com\/R3dKn33-zz"
},
"html_url": "https:\/\/github.com\/R3dKn33-zz\/CVE-2013-0156",
"description": "Arbitrary deserialization that can be used to trigger SQL injection and even Code execution",
"fork": false,
"created_at": "2019-05-27T19:17:55Z",
"updated_at": "2019-05-27T19:25:01Z",
"pushed_at": "2019-05-27T19:24:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 672302842,
"name": "kuang_grade_mk11",

View file

@ -59,36 +59,6 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 200347068,
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"owner": {
"login": "tachibana51",
"id": 29031994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4",
"html_url": "https:\/\/github.com\/tachibana51"
},
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"description": "this is not stable",
"fork": false,
"created_at": "2019-08-03T07:38:18Z",
"updated_at": "2019-10-26T18:48:26Z",
"pushed_at": "2019-08-03T07:58:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 275396332,
"name": "CVE-2013-2028-Exploit",

View file

@ -148,35 +148,5 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 198426665,
"name": "CVE-2013-2094",
"full_name": "vnik5287\/CVE-2013-2094",
"owner": {
"login": "vnik5287",
"id": 9650718,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4",
"html_url": "https:\/\/github.com\/vnik5287"
},
"html_url": "https:\/\/github.com\/vnik5287\/CVE-2013-2094",
"description": "perf_swevent_init",
"fork": false,
"created_at": "2019-07-23T12:31:55Z",
"updated_at": "2019-07-23T12:33:10Z",
"pushed_at": "2019-07-23T12:33:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)",
"fork": false,
"created_at": "2021-02-25T21:57:24Z",
"updated_at": "2023-05-14T17:57:10Z",
"updated_at": "2023-12-10T10:24:20Z",
"pushed_at": "2021-02-25T22:04:14Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,32 +0,0 @@
[
{
"id": 56461631,
"name": "cfengine-CVE-2016-2118",
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
"description": "An example detection and remediation policy.",
"fork": false,
"created_at": "2016-04-17T22:22:04Z",
"updated_at": "2016-04-18T02:57:44Z",
"pushed_at": "2016-04-19T14:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 56758577,
"name": "CVE-2016-3141",
"full_name": "peternguyen93\/CVE-2016-3141",
"owner": {
"login": "peternguyen93",
"id": 1802870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
"html_url": "https:\/\/github.com\/peternguyen93"
},
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
"description": "CVE-2016-3141",
"fork": false,
"created_at": "2016-04-21T08:59:05Z",
"updated_at": "2023-03-11T18:41:15Z",
"pushed_at": "2016-04-23T15:55:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -13,10 +13,10 @@
"description": "Commvault-CVE-2017-18044",
"fork": false,
"created_at": "2018-10-02T19:18:31Z",
"updated_at": "2023-09-28T10:54:32Z",
"updated_at": "2023-12-10T09:56:08Z",
"pushed_at": "2018-10-07T18:12:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "This is an edited version of the CVE-2018-19422 exploit to fix an small but annoying issue I had.",
"fork": false,
"created_at": "2022-04-29T17:23:23Z",
"updated_at": "2022-04-29T17:27:25Z",
"updated_at": "2023-12-10T10:52:24Z",
"pushed_at": "2022-04-29T17:27:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-12-09T22:25:02Z",
"updated_at": "2023-12-09T22:25:26Z",
"updated_at": "2023-12-10T11:10:13Z",
"pushed_at": "2023-12-09T22:25:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
"fork": false,
"created_at": "2021-12-21T19:23:09Z",
"updated_at": "2023-10-17T11:56:53Z",
"updated_at": "2023-12-10T06:55:20Z",
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 0
}

View file

@ -118,5 +118,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 729798547,
"name": "Internet-Explorer-UAF",
"full_name": "Micky-Thongam\/Internet-Explorer-UAF",
"owner": {
"login": "Micky-Thongam",
"id": 107787739,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107787739?v=4",
"html_url": "https:\/\/github.com\/Micky-Thongam"
},
"html_url": "https:\/\/github.com\/Micky-Thongam\/Internet-Explorer-UAF",
"description": "Porting the CVE-2020-0674 exploit for Windows8.1 and Windows10",
"fork": false,
"created_at": "2023-12-10T11:52:48Z",
"updated_at": "2023-12-10T12:11:32Z",
"pushed_at": "2023-12-10T12:11:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
"fork": false,
"created_at": "2020-12-24T09:10:17Z",
"updated_at": "2023-10-29T09:47:59Z",
"updated_at": "2023-12-10T08:21:47Z",
"pushed_at": "2020-12-25T09:51:37Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},

View file

@ -193,10 +193,10 @@
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-06-29T12:37:31Z",
"updated_at": "2023-11-21T16:23:40Z",
"updated_at": "2023-12-10T10:31:12Z",
"pushed_at": "2022-06-30T08:36:58Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},

View file

@ -133,12 +133,12 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2023-12-07T13:30:54Z",
"updated_at": "2023-12-10T07:30:19Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -147,8 +147,8 @@
"exploit"
],
"visibility": "public",
"forks": 21,
"watchers": 112,
"forks": 22,
"watchers": 113,
"score": 0,
"subscribers_count": 2
},

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-12-09T08:23:36Z",
"updated_at": "2023-12-10T07:12:32Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 913,
"watchers_count": 913,
"stargazers_count": 914,
"watchers_count": 914,
"has_discussions": false,
"forks_count": 175,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 175,
"watchers": 913,
"watchers": 914,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false,
"created_at": "2022-06-07T23:26:47Z",
"updated_at": "2023-12-04T19:30:00Z",
"updated_at": "2023-12-10T12:12:35Z",
"pushed_at": "2022-11-20T03:03:53Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 201,
"watchers": 200,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-12-08T02:31:01Z",
"updated_at": "2023-12-10T09:40:42Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 373,
"watchers_count": 373,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 372,
"watchers": 373,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
"fork": false,
"created_at": "2023-06-12T10:44:59Z",
"updated_at": "2023-12-06T09:02:13Z",
"updated_at": "2023-12-10T12:20:30Z",
"pushed_at": "2023-07-27T08:58:10Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2023-12-08T17:25:47Z",
"updated_at": "2023-12-10T07:39:34Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 1
},

32
2023/CVE-2023-30547.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 729751099,
"name": "CVE-2023-30547",
"full_name": "rvizx\/CVE-2023-30547",
"owner": {
"login": "rvizx",
"id": 84989569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
"html_url": "https:\/\/github.com\/rvizx"
},
"html_url": "https:\/\/github.com\/rvizx\/CVE-2023-30547",
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
"fork": false,
"created_at": "2023-12-10T08:32:26Z",
"updated_at": "2023-12-10T11:21:39Z",
"pushed_at": "2023-12-10T11:23:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -169,10 +169,10 @@
"description": "POC for CVE-2023-38646",
"fork": false,
"created_at": "2023-07-30T09:56:52Z",
"updated_at": "2023-12-10T06:12:47Z",
"updated_at": "2023-12-10T07:26:16Z",
"pushed_at": "2023-12-07T11:10:46Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 19,
"watchers": 18,
"score": 0,
"subscribers_count": 0
},

View file

@ -1119,7 +1119,7 @@
"subscribers_count": 1
},
{
"id": 729723100,
"id": 729734696,
"name": "CVE-2023-38831-EXP",
"full_name": "80r1ng\/CVE-2023-38831-EXP",
"owner": {
@ -1131,9 +1131,9 @@
"html_url": "https:\/\/github.com\/80r1ng\/CVE-2023-38831-EXP",
"description": null,
"fork": false,
"created_at": "2023-12-10T06:16:26Z",
"updated_at": "2023-12-10T06:16:27Z",
"pushed_at": "2023-12-10T06:16:27Z",
"created_at": "2023-12-10T07:13:38Z",
"updated_at": "2023-12-10T07:19:06Z",
"pushed_at": "2023-12-10T07:19:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -104,7 +104,7 @@
"fork": false,
"created_at": "2023-11-28T00:55:11Z",
"updated_at": "2023-11-28T00:55:24Z",
"pushed_at": "2023-11-28T00:55:20Z",
"pushed_at": "2023-12-10T10:18:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-12-08T12:39:20Z",
"updated_at": "2023-12-10T09:24:13Z",
"pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 196,
"watchers": 195,
"score": 0,
"subscribers_count": 6
},
@ -43,10 +43,10 @@
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
"updated_at": "2023-11-26T05:12:39Z",
"updated_at": "2023-12-10T09:24:09Z",
"pushed_at": "2023-10-13T11:19:10Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 40,
"watchers": 39,
"score": 0,
"subscribers_count": 2
},
@ -111,10 +111,10 @@
"description": "CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T07:06:42Z",
"updated_at": "2023-10-19T14:05:17Z",
"updated_at": "2023-12-10T09:24:05Z",
"pushed_at": "2023-10-12T07:11:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -141,10 +141,10 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
"updated_at": "2023-12-09T07:49:25Z",
"updated_at": "2023-12-10T09:24:08Z",
"pushed_at": "2023-10-30T20:22:37Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -153,7 +153,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 31,
"watchers": 30,
"score": 0,
"subscribers_count": 2
},
@ -171,10 +171,10 @@
"description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-16T11:07:50Z",
"updated_at": "2023-12-06T03:26:03Z",
"updated_at": "2023-12-10T09:24:06Z",
"pushed_at": "2023-10-16T12:32:50Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -193,7 +193,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -500,13 +500,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -2653,6 +2653,13 @@
- [BenEdridge/CVE-2023-30533](https://github.com/BenEdridge/CVE-2023-30533)
### CVE-2023-30547 (2023-04-17)
<code>vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
</code>
- [rvizx/CVE-2023-30547](https://github.com/rvizx/CVE-2023-30547)
### CVE-2023-30765 (2023-07-10)
<code>\nDelta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation.\n\n
@ -18995,6 +19002,7 @@
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
- [Ken-Abruzzi/CVE-2020-0674](https://github.com/Ken-Abruzzi/CVE-2020-0674)
- [Neko-chanQwQ/CVE-2020-0674-PoC](https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC)
- [Micky-Thongam/Internet-Explorer-UAF](https://github.com/Micky-Thongam/Internet-Explorer-UAF)
### CVE-2020-0683 (2020-02-11)
@ -33476,13 +33484,6 @@
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
### CVE-2016-2118 (2016-04-12)
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka &quot;BADLOCK.&quot;
</code>
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
### CVE-2016-2173 (2017-04-21)
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
@ -33604,13 +33605,6 @@
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
### CVE-2016-3141 (2016-03-31)
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
</code>
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
### CVE-2016-3238 (2016-07-12)
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka &quot;Windows Print Spooler Remote Code Execution Vulnerability.&quot;
@ -36137,7 +36131,6 @@
- [heroku/heroku-CVE-2013-0156](https://github.com/heroku/heroku-CVE-2013-0156)
- [josal/crack-0.1.8-fixed](https://github.com/josal/crack-0.1.8-fixed)
- [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156)
- [R3dKn33-zz/CVE-2013-0156](https://github.com/R3dKn33-zz/CVE-2013-0156)
- [Jjdt12/kuang_grade_mk11](https://github.com/Jjdt12/kuang_grade_mk11)
### CVE-2013-0212 (2013-02-24)
@ -36248,7 +36241,6 @@
- [danghvu/nginx-1.4.0](https://github.com/danghvu/nginx-1.4.0)
- [kitctf/nginxpwn](https://github.com/kitctf/nginxpwn)
- [tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC](https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC)
- [m4drat/CVE-2013-2028-Exploit](https://github.com/m4drat/CVE-2013-2028-Exploit)
- [mambroziak/docker-cve-2013-2028](https://github.com/mambroziak/docker-cve-2013-2028)
- [jptr218/nginxhack](https://github.com/jptr218/nginxhack)
@ -36271,7 +36263,6 @@
- [Pashkela/CVE-2013-2094](https://github.com/Pashkela/CVE-2013-2094)
- [tarunyadav/fix-cve-2013-2094](https://github.com/tarunyadav/fix-cve-2013-2094)
- [timhsutw/cve-2013-2094](https://github.com/timhsutw/cve-2013-2094)
- [vnik5287/CVE-2013-2094](https://github.com/vnik5287/CVE-2013-2094)
### CVE-2013-2165 (2013-07-22)
@ -36730,7 +36721,6 @@
<code>diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
</code>
- [hiikezoe/diaggetroot](https://github.com/hiikezoe/diaggetroot)
- [poliva/root-zte-open](https://github.com/poliva/root-zte-open)
### CVE-2012-4431 (2012-12-19)
@ -36797,19 +36787,8 @@
<code>** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
</code>
- [Hood3dRob1n/MySQL-Fu.rb](https://github.com/Hood3dRob1n/MySQL-Fu.rb)
- [w4fz5uck5/UDFPwn-CVE-2012-5613](https://github.com/w4fz5uck5/UDFPwn-CVE-2012-5613)
### CVE-2012-5664
- [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test)
### CVE-2012-5958 (2013-01-31)
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
</code>
- [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp)
### CVE-2012-5960 (2013-01-31)
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.