mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/06/28 00:23:47
This commit is contained in:
parent
1d65508238
commit
ad6e6cadc7
51 changed files with 139 additions and 686 deletions
|
@ -33,35 +33,5 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 421212210,
|
||||
"name": "cve-2000-0649",
|
||||
"full_name": "stevenvegar\/cve-2000-0649",
|
||||
"owner": {
|
||||
"login": "stevenvegar",
|
||||
"id": 70730301,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4",
|
||||
"html_url": "https:\/\/github.com\/stevenvegar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649",
|
||||
"description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T23:14:04Z",
|
||||
"updated_at": "2021-12-17T07:02:21Z",
|
||||
"pushed_at": "2021-10-25T23:32:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -29,66 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 29933656,
|
||||
"name": "CVE-2015-0235-cookbook",
|
||||
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
|
||||
"owner": {
|
||||
"login": "mikesplain",
|
||||
"id": 881965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4",
|
||||
"html_url": "https:\/\/github.com\/mikesplain"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
|
||||
"description": "A chef cookbook to test the GHOST vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T20:34:42Z",
|
||||
"updated_at": "2017-09-29T11:32:54Z",
|
||||
"pushed_at": "2015-01-27T21:41:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 29941036,
|
||||
"name": "CVE-2015-0235-test",
|
||||
"full_name": "aaronfay\/CVE-2015-0235-test",
|
||||
"owner": {
|
||||
"login": "aaronfay",
|
||||
"id": 1033941,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1033941?v=4",
|
||||
"html_url": "https:\/\/github.com\/aaronfay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
|
||||
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T23:45:22Z",
|
||||
"updated_at": "2023-03-07T20:55:14Z",
|
||||
"pushed_at": "2015-01-29T03:33:29Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 29942046,
|
||||
"name": "ghost",
|
||||
|
@ -209,66 +149,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 30004399,
|
||||
"name": "cfengine-CVE_2015_0235",
|
||||
"full_name": "nickanderson\/cfengine-CVE_2015_0235",
|
||||
"owner": {
|
||||
"login": "nickanderson",
|
||||
"id": 202896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickanderson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
|
||||
"description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-29T04:58:54Z",
|
||||
"updated_at": "2016-02-13T01:41:47Z",
|
||||
"pushed_at": "2015-01-29T21:23:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 30008427,
|
||||
"name": "cookbook-update-glibc",
|
||||
"full_name": "koudaiii-archives\/cookbook-update-glibc",
|
||||
"owner": {
|
||||
"login": "koudaiii-archives",
|
||||
"id": 51727289,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51727289?v=4",
|
||||
"html_url": "https:\/\/github.com\/koudaiii-archives"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc",
|
||||
"description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-29T07:14:17Z",
|
||||
"updated_at": "2023-01-28T20:14:16Z",
|
||||
"pushed_at": "2015-01-29T07:38:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 30019912,
|
||||
"name": "ghostbusters15",
|
||||
|
@ -299,36 +179,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 30066365,
|
||||
"name": "CVE-2015-0235",
|
||||
"full_name": "tobyzxj\/CVE-2015-0235",
|
||||
"owner": {
|
||||
"login": "tobyzxj",
|
||||
"id": 4661855,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4",
|
||||
"html_url": "https:\/\/github.com\/tobyzxj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
|
||||
"description": "glibc gethostbyname bug",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-30T09:58:09Z",
|
||||
"updated_at": "2020-10-17T20:24:46Z",
|
||||
"pushed_at": "2015-01-30T10:02:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 30183649,
|
||||
"name": "CVE-2015-0235-workaround",
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2023-06-20T11:38:37Z",
|
||||
"updated_at": "2023-06-27T20:02:18Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 926,
|
||||
"watchers_count": 926,
|
||||
"stargazers_count": 927,
|
||||
"watchers_count": 927,
|
||||
"has_discussions": false,
|
||||
"forks_count": 405,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 405,
|
||||
"watchers": 926,
|
||||
"watchers": 927,
|
||||
"score": 0,
|
||||
"subscribers_count": 65
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2023-06-25T06:42:09Z",
|
||||
"updated_at": "2023-06-27T19:13:02Z",
|
||||
"pushed_at": "2022-12-27T20:25:09Z",
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 350,
|
||||
"watchers": 351,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2023-02-21T15:05:18Z",
|
||||
"updated_at": "2023-06-27T20:52:06Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 181,
|
||||
"watchers": 182,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -59,66 +59,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
{
|
||||
"id": 153477523,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "hook-s3c\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "hook-s3c",
|
||||
"id": 31825993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
|
||||
"html_url": "https:\/\/github.com\/hook-s3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T15:09:41Z",
|
||||
"updated_at": "2021-12-05T20:25:44Z",
|
||||
"pushed_at": "2018-10-17T15:09:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153506738,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "kn6869610\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "kn6869610",
|
||||
"id": 6917744,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
|
||||
"html_url": "https:\/\/github.com\/kn6869610"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
|
||||
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T18:44:05Z",
|
||||
"updated_at": "2021-12-05T20:25:52Z",
|
||||
"pushed_at": "2018-10-17T18:45:30Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153534574,
|
||||
"name": "libssh-scanner",
|
||||
|
@ -149,101 +89,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
{
|
||||
"id": 153562229,
|
||||
"name": "CVE-2018-10933_ssh",
|
||||
"full_name": "likescam\/CVE-2018-10933_ssh",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T04:10:25Z",
|
||||
"updated_at": "2021-12-05T20:26:01Z",
|
||||
"pushed_at": "2018-10-18T04:10:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153598283,
|
||||
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T09:27:08Z",
|
||||
"updated_at": "2021-12-05T20:26:14Z",
|
||||
"pushed_at": "2018-10-18T09:27:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153643745,
|
||||
"name": "hunt-for-cve-2018-10933",
|
||||
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "marco-lancini",
|
||||
"id": 1472968,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
|
||||
"html_url": "https:\/\/github.com\/marco-lancini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T15:08:25Z",
|
||||
"updated_at": "2023-06-20T11:06:21Z",
|
||||
"pushed_at": "2018-10-18T15:11:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"elasticsearch",
|
||||
"exploit",
|
||||
"nmap",
|
||||
"pentesting"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153675108,
|
||||
"name": "cve-2018-10933",
|
||||
|
@ -304,100 +149,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153855090,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "jas502n\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
|
||||
"description": "libssh CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:24:04Z",
|
||||
"updated_at": "2023-05-23T04:45:13Z",
|
||||
"pushed_at": "2018-10-20T00:29:04Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153856713,
|
||||
"name": "cve-2018-10933_poc",
|
||||
"full_name": "ninp0\/cve-2018-10933_poc",
|
||||
"owner": {
|
||||
"login": "ninp0",
|
||||
"id": 1008583,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
|
||||
"html_url": "https:\/\/github.com\/ninp0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
|
||||
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:53:24Z",
|
||||
"updated_at": "2018-10-22T15:05:53Z",
|
||||
"pushed_at": "2018-10-20T01:53:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2018-10933",
|
||||
"exploit",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153878160,
|
||||
"name": "CVE-2018-10933_Scanner",
|
||||
"full_name": "pghook\/CVE-2018-10933_Scanner",
|
||||
"owner": {
|
||||
"login": "pghook",
|
||||
"id": 14160529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
|
||||
"html_url": "https:\/\/github.com\/pghook"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T06:53:59Z",
|
||||
"updated_at": "2020-05-15T17:20:56Z",
|
||||
"pushed_at": "2018-10-20T04:54:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153920395,
|
||||
"name": "POC-CVE-2018-10933",
|
||||
|
@ -428,36 +179,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 153975086,
|
||||
"name": "pythonprojects-CVE-2018-10933",
|
||||
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "shifa123",
|
||||
"id": 18241082,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
|
||||
"html_url": "https:\/\/github.com\/shifa123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-21T05:01:12Z",
|
||||
"updated_at": "2022-01-03T19:20:42Z",
|
||||
"pushed_at": "2018-10-21T05:13:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 154050332,
|
||||
"name": "CVE-2018-10933",
|
||||
|
|
|
@ -1,38 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 153770795,
|
||||
"name": "CVE-2018-12018",
|
||||
"full_name": "k3v142\/CVE-2018-12018",
|
||||
"owner": {
|
||||
"login": "k3v142",
|
||||
"id": 12337759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4",
|
||||
"html_url": "https:\/\/github.com\/k3v142"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018",
|
||||
"description": "EPoD (Ethereum Packet of Death)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-19T11:11:01Z",
|
||||
"updated_at": "2023-01-28T19:03:04Z",
|
||||
"pushed_at": "2018-10-20T21:07:42Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"ethereum",
|
||||
"ethereum-node",
|
||||
"exploit",
|
||||
"python",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -59,36 +59,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 152906288,
|
||||
"name": "MikroRoot",
|
||||
"full_name": "syrex1013\/MikroRoot",
|
||||
"owner": {
|
||||
"login": "syrex1013",
|
||||
"id": 31669127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
|
||||
"html_url": "https:\/\/github.com\/syrex1013"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
|
||||
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-13T19:17:42Z",
|
||||
"updated_at": "2021-12-06T20:08:10Z",
|
||||
"pushed_at": "2018-10-14T08:39:24Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 161894724,
|
||||
"name": "CVE-2018-14847",
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -149,36 +149,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 151921677,
|
||||
"name": "CVE-2018-2893",
|
||||
"full_name": "jas502n\/CVE-2018-2893",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893",
|
||||
"description": "CVE-2018-2893",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-07T08:41:14Z",
|
||||
"updated_at": "2023-06-02T07:03:04Z",
|
||||
"pushed_at": "2018-10-07T09:53:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 219763712,
|
||||
"name": "CVE-2018-2893",
|
||||
|
|
|
@ -1597,7 +1597,7 @@
|
|||
"forks": 22,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 188287755,
|
||||
|
@ -2082,7 +2082,7 @@
|
|||
"forks": 15,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 189959275,
|
||||
|
@ -2478,7 +2478,7 @@
|
|||
"forks": 97,
|
||||
"watchers": 293,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
"subscribers_count": 21
|
||||
},
|
||||
{
|
||||
"id": 198731225,
|
||||
|
|
|
@ -267,7 +267,7 @@
|
|||
"forks": 45,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
"subscribers_count": 9
|
||||
},
|
||||
{
|
||||
"id": 218080163,
|
||||
|
|
|
@ -493,7 +493,7 @@
|
|||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 382906478,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -57,7 +57,7 @@
|
|||
"forks": 63,
|
||||
"watchers": 210,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
"subscribers_count": 16
|
||||
},
|
||||
{
|
||||
"id": 248283931,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2023-06-20T23:45:09Z",
|
||||
"updated_at": "2023-06-27T21:29:33Z",
|
||||
"pushed_at": "2022-04-14T18:23:38Z",
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 299,
|
||||
"watchers": 301,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 349235683,
|
||||
|
|
|
@ -35,6 +35,6 @@
|
|||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
"subscribers_count": 6
|
||||
}
|
||||
]
|
|
@ -32,7 +32,7 @@
|
|||
"forks": 136,
|
||||
"watchers": 665,
|
||||
"score": 0,
|
||||
"subscribers_count": 42
|
||||
"subscribers_count": 43
|
||||
},
|
||||
{
|
||||
"id": 263921419,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2023-06-26T20:40:00Z",
|
||||
"updated_at": "2023-06-27T20:02:22Z",
|
||||
"pushed_at": "2023-02-06T19:18:56Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -1096,10 +1096,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2023-06-27T02:17:44Z",
|
||||
"updated_at": "2023-06-27T19:32:09Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1262,
|
||||
"watchers_count": 1262,
|
||||
"stargazers_count": 1263,
|
||||
"watchers_count": 1263,
|
||||
"has_discussions": false,
|
||||
"forks_count": 368,
|
||||
"allow_forking": true,
|
||||
|
@ -1114,7 +1114,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 368,
|
||||
"watchers": 1262,
|
||||
"watchers": 1263,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
@ -1398,7 +1398,7 @@
|
|||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 255573167,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 10,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 32,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 280822745,
|
||||
|
|
|
@ -67,7 +67,7 @@
|
|||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 286767343,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 43,
|
||||
"watchers": 159,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 499143889,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 307446561,
|
||||
|
|
|
@ -57,7 +57,7 @@
|
|||
"forks": 359,
|
||||
"watchers": 1592,
|
||||
"score": 0,
|
||||
"subscribers_count": 89
|
||||
"subscribers_count": 90
|
||||
},
|
||||
{
|
||||
"id": 295480770,
|
||||
|
@ -154,7 +154,7 @@
|
|||
"forks": 65,
|
||||
"watchers": 348,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
"subscribers_count": 9
|
||||
},
|
||||
{
|
||||
"id": 295515909,
|
||||
|
|
|
@ -256,7 +256,7 @@
|
|||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 304797048,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -35,6 +35,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -33,6 +33,6 @@
|
|||
"forks": 4,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -57,7 +57,7 @@
|
|||
"forks": 27,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 281263657,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2023-04-13T16:01:26Z",
|
||||
"updated_at": "2023-06-27T20:42:31Z",
|
||||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 12,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T15:44:00Z",
|
||||
"updated_at": "2023-06-08T12:37:33Z",
|
||||
"updated_at": "2023-06-27T19:12:24Z",
|
||||
"pushed_at": "2021-06-26T18:31:23Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -114,7 +114,7 @@
|
|||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -127,7 +127,7 @@
|
|||
"windowsexploits"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -4726,5 +4726,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 659471096,
|
||||
"name": "lab_cve-2021-4034-polkit-emulation-and-detection",
|
||||
"full_name": "ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
|
||||
"owner": {
|
||||
"login": "ps-interactive",
|
||||
"id": 35313392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4",
|
||||
"html_url": "https:\/\/github.com\/ps-interactive"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T23:06:02Z",
|
||||
"updated_at": "2023-06-27T23:15:26Z",
|
||||
"pushed_at": "2023-06-27T23:21:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-06-27T03:46:09Z",
|
||||
"updated_at": "2023-06-27T21:26:15Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 691,
|
||||
"watchers_count": 691,
|
||||
"stargazers_count": 692,
|
||||
"watchers_count": 692,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 691,
|
||||
"watchers": 692,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -1215,10 +1215,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-06-27T02:11:14Z",
|
||||
"updated_at": "2023-06-27T21:20:13Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"has_discussions": false,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
|
@ -1227,7 +1227,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 419,
|
||||
"watchers": 420,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2023-06-24T19:27:47Z",
|
||||
"updated_at": "2023-06-27T21:58:35Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2023-06-23T14:21:49Z",
|
||||
"updated_at": "2023-06-27T23:24:09Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 534,
|
||||
"watchers_count": 534,
|
||||
"stargazers_count": 533,
|
||||
"watchers_count": 533,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 534,
|
||||
"watchers": 533,
|
||||
"score": 0,
|
||||
"subscribers_count": 49
|
||||
},
|
||||
|
|
|
@ -1333,10 +1333,10 @@
|
|||
"description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T08:29:24Z",
|
||||
"updated_at": "2023-06-27T09:01:59Z",
|
||||
"updated_at": "2023-06-27T20:49:18Z",
|
||||
"pushed_at": "2023-06-27T09:01:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1345,7 +1345,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -226,10 +226,10 @@
|
|||
"description": "ImageMagick LFI PoC [CVE-2022-44268]",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-06T10:44:43Z",
|
||||
"updated_at": "2023-06-26T18:05:55Z",
|
||||
"updated_at": "2023-06-27T23:04:53Z",
|
||||
"pushed_at": "2023-02-06T10:48:56Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -242,7 +242,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T20:15:36Z",
|
||||
"updated_at": "2023-06-27T12:36:24Z",
|
||||
"updated_at": "2023-06-27T20:00:59Z",
|
||||
"pushed_at": "2023-06-20T21:32:56Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 31,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-32243",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-15T09:39:45Z",
|
||||
"updated_at": "2023-06-26T07:09:48Z",
|
||||
"updated_at": "2023-06-27T22:55:35Z",
|
||||
"pushed_at": "2023-06-05T08:13:19Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T12:56:12Z",
|
||||
"updated_at": "2023-06-23T10:46:57Z",
|
||||
"updated_at": "2023-06-27T21:38:55Z",
|
||||
"pushed_at": "2023-06-13T08:46:03Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
38
README.md
38
README.md
|
@ -1817,35 +1817,35 @@
|
|||
|
||||
- [leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below](https://github.com/leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below)
|
||||
|
||||
### CVE-2023-34835 (-)
|
||||
### CVE-2023-34835 (2023-06-27)
|
||||
|
||||
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.
|
||||
</code>
|
||||
|
||||
- [sahiloj/CVE-2023-34835](https://github.com/sahiloj/CVE-2023-34835)
|
||||
|
||||
### CVE-2023-34836 (-)
|
||||
### CVE-2023-34836 (2023-06-27)
|
||||
|
||||
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Dtltyp and ListName parameters.
|
||||
</code>
|
||||
|
||||
- [sahiloj/CVE-2023-34836](https://github.com/sahiloj/CVE-2023-34836)
|
||||
|
||||
### CVE-2023-34837 (-)
|
||||
### CVE-2023-34837 (2023-06-27)
|
||||
|
||||
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a vulnerable parameter GrpPath.
|
||||
</code>
|
||||
|
||||
- [sahiloj/CVE-2023-34837](https://github.com/sahiloj/CVE-2023-34837)
|
||||
|
||||
### CVE-2023-34838 (-)
|
||||
### CVE-2023-34838 (2023-06-27)
|
||||
|
||||
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Description parameter.
|
||||
</code>
|
||||
|
||||
- [sahiloj/CVE-2023-34838](https://github.com/sahiloj/CVE-2023-34838)
|
||||
|
||||
### CVE-2023-34839 (-)
|
||||
### CVE-2023-34839 (2023-06-27)
|
||||
|
||||
<code>A Cross Site Request Forgery (CSRF) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via a Custom CSRF exploit to create new user function in the application.
|
||||
</code>
|
||||
|
@ -1855,6 +1855,9 @@
|
|||
### CVE-2023-34840
|
||||
- [Xh4H/CVE-2023-34840](https://github.com/Xh4H/CVE-2023-34840)
|
||||
|
||||
### CVE-2023-34843
|
||||
- [rootd4ddy/CVE-2023-34843](https://github.com/rootd4ddy/CVE-2023-34843)
|
||||
|
||||
### CVE-2023-34852 (2023-06-15)
|
||||
|
||||
<code>PublicCMS <=V4.0.202302 is vulnerable to Insecure Permissions.
|
||||
|
@ -9115,6 +9118,7 @@
|
|||
- [mutur4/CVE-2021-4034](https://github.com/mutur4/CVE-2021-4034)
|
||||
- [crypticdante/CVE-2021-4034_Python3](https://github.com/crypticdante/CVE-2021-4034_Python3)
|
||||
- [TheSermux/CVE-2021-4034](https://github.com/TheSermux/CVE-2021-4034)
|
||||
- [ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection](https://github.com/ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection)
|
||||
|
||||
### CVE-2021-4043 (2022-02-04)
|
||||
|
||||
|
@ -23341,7 +23345,6 @@
|
|||
- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
|
||||
- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
|
||||
- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
|
||||
- [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893)
|
||||
- [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893)
|
||||
|
||||
### CVE-2018-2894 (2018-07-18)
|
||||
|
@ -24703,19 +24706,10 @@
|
|||
|
||||
- [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933)
|
||||
- [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933)
|
||||
- [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933)
|
||||
- [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933)
|
||||
- [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner)
|
||||
- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
|
||||
- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
|
||||
- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
|
||||
- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
|
||||
- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
|
||||
- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
|
||||
- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
|
||||
- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
|
||||
- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
|
||||
- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
|
||||
- [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
|
||||
- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
|
||||
- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
|
||||
|
@ -24893,13 +24887,6 @@
|
|||
|
||||
- [anmuxi-bai/CVE-2018-11790](https://github.com/anmuxi-bai/CVE-2018-11790)
|
||||
|
||||
### CVE-2018-12018 (2018-07-04)
|
||||
|
||||
<code>The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue.
|
||||
</code>
|
||||
|
||||
- [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018)
|
||||
|
||||
### CVE-2018-12031 (2018-06-07)
|
||||
|
||||
<code>Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
|
||||
|
@ -25211,7 +25198,6 @@
|
|||
|
||||
- [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC)
|
||||
- [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit)
|
||||
- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
|
||||
- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
|
||||
- [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
|
||||
- [Tr33-He11/winboxPOC](https://github.com/Tr33-He11/winboxPOC)
|
||||
|
@ -29670,16 +29656,11 @@
|
|||
</code>
|
||||
|
||||
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
|
||||
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
|
||||
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
|
||||
- [piyokango/ghost](https://github.com/piyokango/ghost)
|
||||
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
|
||||
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
|
||||
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
|
||||
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
|
||||
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
|
||||
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
|
||||
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
|
||||
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
|
||||
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
|
||||
- [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc)
|
||||
|
@ -33115,7 +33096,6 @@
|
|||
</code>
|
||||
|
||||
- [rafaelh/CVE-2000-0649](https://github.com/rafaelh/CVE-2000-0649)
|
||||
- [stevenvegar/cve-2000-0649](https://github.com/stevenvegar/cve-2000-0649)
|
||||
|
||||
### CVE-2000-0979 (2001-01-22)
|
||||
|
||||
|
|
Loading…
Reference in a new issue