Auto Update 2023/10/30 18:25:22

This commit is contained in:
motikan2010-bot 2023-10-31 03:25:22 +09:00
parent 421bf304df
commit ae87bb4382
40 changed files with 379 additions and 136 deletions

32
2007/CVE-2007-6750.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 712031420,
"name": "slowl0ris",
"full_name": "Jeanpseven\/slowl0ris",
"owner": {
"login": "Jeanpseven",
"id": 134978254,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134978254?v=4",
"html_url": "https:\/\/github.com\/Jeanpseven"
},
"html_url": "https:\/\/github.com\/Jeanpseven\/slowl0ris",
"description": "Funciona pra explorar o CVE-2007-6750 (vulnerabilidade ao DoS de slowloris)",
"fork": false,
"created_at": "2023-10-30T16:50:13Z",
"updated_at": "2023-10-30T16:52:10Z",
"pushed_at": "2023-10-30T17:20:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2023-10-15T09:18:57Z",
"updated_at": "2023-10-30T17:05:43Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 935,
"watchers_count": 935,
"has_discussions": false,
"forks_count": 404,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 404,
"watchers": 933,
"watchers": 935,
"score": 0,
"subscribers_count": 65
},

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-10-24T12:41:35Z",
"updated_at": "2023-10-30T15:02:23Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 4
},

View file

@ -53,10 +53,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2023-09-28T10:47:12Z",
"updated_at": "2023-10-30T13:36:32Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 544,
"watchers_count": 544,
"stargazers_count": 545,
"watchers_count": 545,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 71,
"watchers": 544,
"watchers": 545,
"score": 0,
"subscribers_count": 47
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -869,10 +869,10 @@
"description": null,
"fork": false,
"created_at": "2019-05-16T13:21:02Z",
"updated_at": "2023-09-28T11:01:46Z",
"updated_at": "2023-10-30T18:08:08Z",
"pushed_at": "2019-05-22T04:24:58Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -883,7 +883,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2023-10-30T08:18:06Z",
"updated_at": "2023-10-30T14:22:45Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 179,
"watchers": 181,
"score": 0,
"subscribers_count": 4
},

View file

@ -51,13 +51,13 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 9,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 8,
"watchers": 18,
"score": 0,
"subscribers_count": 2

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-10-17T19:15:06Z",
"updated_at": "2023-10-30T12:37:33Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1075,
"watchers_count": 1075,
"stargazers_count": 1074,
"watchers_count": 1074,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1075,
"watchers": 1074,
"score": 0,
"subscribers_count": 37
}

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-10-24T12:41:35Z",
"updated_at": "2023-10-30T15:02:23Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 4
}

View file

@ -178,5 +178,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 711985399,
"name": "-vlrhsgody-RocketChat-CVE-2021-22911-",
"full_name": "vlrhsgody\/-vlrhsgody-RocketChat-CVE-2021-22911-",
"owner": {
"login": "vlrhsgody",
"id": 106510018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106510018?v=4",
"html_url": "https:\/\/github.com\/vlrhsgody"
},
"html_url": "https:\/\/github.com\/vlrhsgody\/-vlrhsgody-RocketChat-CVE-2021-22911-",
"description": null,
"fork": false,
"created_at": "2023-10-30T15:09:37Z",
"updated_at": "2023-10-30T17:33:17Z",
"pushed_at": "2023-10-30T17:29:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-10-17T19:15:06Z",
"updated_at": "2023-10-30T12:37:33Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1075,
"watchers_count": 1075,
"stargazers_count": 1074,
"watchers_count": 1074,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1075,
"watchers": 1074,
"score": 0,
"subscribers_count": 37
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2

View file

@ -869,12 +869,12 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2023-09-28T11:32:07Z",
"updated_at": "2023-10-30T16:08:10Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -886,8 +886,8 @@
"pentesting"
],
"visibility": "public",
"forks": 16,
"watchers": 58,
"forks": 17,
"watchers": 59,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,10 +73,10 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2023-10-18T07:56:55Z",
"updated_at": "2023-10-30T12:37:33Z",
"pushed_at": "2023-02-14T07:05:22Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 339,
"watchers_count": 339,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 341,
"watchers": 339,
"score": 0,
"subscribers_count": 7
},

View file

@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2023-10-23T11:10:31Z",
"updated_at": "2023-10-30T14:39:16Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 629,
"watchers": 630,
"score": 0,
"subscribers_count": 28
},
@ -2076,10 +2076,10 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2023-10-04T11:09:30Z",
"updated_at": "2023-10-30T15:07:21Z",
"pushed_at": "2022-10-24T02:25:53Z",
"stargazers_count": 497,
"watchers_count": 497,
"stargazers_count": 498,
"watchers_count": 498,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -2088,7 +2088,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 497,
"watchers": 498,
"score": 0,
"subscribers_count": 26
},

View file

@ -13,10 +13,10 @@
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
"fork": false,
"created_at": "2022-04-02T03:27:11Z",
"updated_at": "2023-10-30T00:25:19Z",
"updated_at": "2023-10-30T16:52:24Z",
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 186,
"watchers": 187,
"score": 0,
"subscribers_count": 7
},

View file

@ -1314,10 +1314,10 @@
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行CVE-2022-22947 注入哥斯拉内存马",
"fork": false,
"created_at": "2022-05-16T15:27:41Z",
"updated_at": "2023-10-18T19:45:24Z",
"updated_at": "2023-10-30T17:04:05Z",
"pushed_at": "2022-05-16T15:33:37Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -1326,7 +1326,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-09-18T15:51:52Z",
"updated_at": "2023-06-12T22:39:24Z",
"pushed_at": "2023-10-29T14:06:21Z",
"pushed_at": "2023-10-30T15:16:05Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,

View file

@ -290,10 +290,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
"fork": false,
"created_at": "2023-02-13T02:00:51Z",
"updated_at": "2023-10-23T11:08:00Z",
"updated_at": "2023-10-30T13:43:53Z",
"pushed_at": "2023-03-27T15:18:49Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -315,7 +315,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -377,10 +377,10 @@
"description": "Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)",
"fork": false,
"created_at": "2023-10-23T14:52:18Z",
"updated_at": "2023-10-30T08:18:35Z",
"pushed_at": "2023-10-25T16:41:36Z",
"stargazers_count": 29,
"watchers_count": 29,
"updated_at": "2023-10-30T17:31:54Z",
"pushed_at": "2023-10-30T15:43:20Z",
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -391,11 +391,13 @@
"cisco-ios-xe",
"cve-2023-20198",
"cve-2023-20273",
"iocisco"
"iocisco",
"pcap",
"suricata"
],
"visibility": "public",
"forks": 5,
"watchers": 29,
"watchers": 31,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-2023",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2023-10-30T09:50:08Z",
"updated_at": "2023-10-30T14:36:31Z",
"pushed_at": "2023-10-15T12:09:05Z",
"stargazers_count": 572,
"watchers_count": 572,
"stargazers_count": 574,
"watchers_count": 574,
"has_discussions": false,
"forks_count": 229,
"forks_count": 231,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 229,
"watchers": 572,
"forks": 231,
"watchers": 574,
"score": 0,
"subscribers_count": 23
},

View file

@ -864,5 +864,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 711978619,
"name": "CVE-2023-23752",
"full_name": "cybernetwiz\/CVE-2023-23752",
"owner": {
"login": "cybernetwiz",
"id": 139291686,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139291686?v=4",
"html_url": "https:\/\/github.com\/cybernetwiz"
},
"html_url": "https:\/\/github.com\/cybernetwiz\/CVE-2023-23752",
"description": "Joomla Unauthorized Access Vulnerability",
"fork": false,
"created_at": "2023-10-30T14:54:56Z",
"updated_at": "2023-10-30T14:54:57Z",
"pushed_at": "2023-10-30T15:06:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
"fork": false,
"created_at": "2023-01-25T03:21:42Z",
"updated_at": "2023-10-29T23:56:21Z",
"updated_at": "2023-10-30T17:57:19Z",
"pushed_at": "2023-02-10T08:03:59Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 253,
"watchers_count": 253,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 252,
"watchers": 253,
"score": 0,
"subscribers_count": 8
},

View file

@ -227,10 +227,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-08T06:15:00Z",
"updated_at": "2023-10-22T16:53:49Z",
"updated_at": "2023-10-30T15:09:27Z",
"pushed_at": "2023-09-11T06:49:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
"fork": false,
"created_at": "2023-05-16T03:06:40Z",
"updated_at": "2023-10-29T13:08:26Z",
"updated_at": "2023-10-30T16:52:50Z",
"pushed_at": "2023-05-16T04:34:16Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 343,
"watchers_count": 343,
"has_discussions": false,
"forks_count": 75,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 342,
"watchers": 343,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation",
"fork": false,
"created_at": "2023-05-15T09:39:45Z",
"updated_at": "2023-10-27T18:44:18Z",
"updated_at": "2023-10-30T14:27:26Z",
"pushed_at": "2023-06-05T08:13:19Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 3
},

View file

@ -172,10 +172,10 @@
"description": "RCE exploit for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T20:17:43Z",
"updated_at": "2023-10-27T14:14:37Z",
"updated_at": "2023-10-30T14:26:31Z",
"pushed_at": "2023-08-23T16:27:28Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -184,7 +184,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 76,
"score": 0,
"subscribers_count": 3

View file

@ -73,10 +73,10 @@
"description": "PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy",
"fork": false,
"created_at": "2023-10-20T02:05:27Z",
"updated_at": "2023-10-28T00:25:28Z",
"updated_at": "2023-10-30T17:07:27Z",
"pushed_at": "2023-10-24T15:56:46Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
},
@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2023-10-29T02:49:31Z",
"updated_at": "2023-10-30T16:52:30Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 30,
"watchers": 33,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-36874 PoC",
"fork": false,
"created_at": "2023-08-20T13:50:42Z",
"updated_at": "2023-10-27T14:43:06Z",
"updated_at": "2023-10-30T14:18:26Z",
"pushed_at": "2023-08-20T13:54:15Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": "一款用于生成winrar程序RCE即cve-2023-38831的POC的工具。",
"fork": false,
"created_at": "2023-08-27T14:08:36Z",
"updated_at": "2023-10-20T07:07:18Z",
"updated_at": "2023-10-30T13:56:32Z",
"pushed_at": "2023-08-27T14:35:00Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 1
},

32
2023/CVE-2023-41064.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 712037145,
"name": "vulnerabilidad-LibWebP-CVE-2023-41064",
"full_name": "MrR0b0t19\/vulnerabilidad-LibWebP-CVE-2023-41064",
"owner": {
"login": "MrR0b0t19",
"id": 63489501,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4",
"html_url": "https:\/\/github.com\/MrR0b0t19"
},
"html_url": "https:\/\/github.com\/MrR0b0t19\/vulnerabilidad-LibWebP-CVE-2023-41064",
"description": "longitudes de código para desencadenar esta vulnerabilidad",
"fork": false,
"created_at": "2023-10-30T17:03:24Z",
"updated_at": "2023-10-30T17:19:13Z",
"pushed_at": "2023-10-30T17:59:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-10-26T12:26:39Z",
"updated_at": "2023-10-30T12:37:44Z",
"pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 177,
"watchers": 178,
"score": 0,
"subscribers_count": 6
},
@ -141,19 +141,19 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
"updated_at": "2023-10-29T18:37:21Z",
"updated_at": "2023-10-30T15:49:39Z",
"pushed_at": "2023-10-28T12:44:01Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"forks": 7,
"watchers": 25,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-10-30T11:28:43Z",
"updated_at": "2023-10-30T11:28:44Z",
"pushed_at": "2023-10-30T12:11:49Z",
"pushed_at": "2023-10-30T14:01:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

92
2023/CVE-2023-46747.json Normal file
View file

@ -0,0 +1,92 @@
[
{
"id": 711928440,
"name": "CVE-2023-46747-PoC",
"full_name": "TomArn1\/CVE-2023-46747-PoC",
"owner": {
"login": "TomArn1",
"id": 149389544,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149389544?v=4",
"html_url": "https:\/\/github.com\/TomArn1"
},
"html_url": "https:\/\/github.com\/TomArn1\/CVE-2023-46747-PoC",
"description": "metasploit module for CVE-2023-46747 (F5 BIG-IP) RCE and the analyze",
"fork": false,
"created_at": "2023-10-30T13:08:47Z",
"updated_at": "2023-10-30T13:18:38Z",
"pushed_at": "2023-10-30T13:17:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 711936232,
"name": "CVE-2023-46747-Mass-RCE",
"full_name": "k0zulzr\/CVE-2023-46747-Mass-RCE",
"owner": {
"login": "k0zulzr",
"id": 101390984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101390984?v=4",
"html_url": "https:\/\/github.com\/k0zulzr"
},
"html_url": "https:\/\/github.com\/k0zulzr\/CVE-2023-46747-Mass-RCE",
"description": "CVE-2023-46747 (F5 BIG-IP) RCE",
"fork": false,
"created_at": "2023-10-30T13:25:45Z",
"updated_at": "2023-10-30T14:10:38Z",
"pushed_at": "2023-10-30T14:01:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 712004935,
"name": "CVE-2023-46747-POC",
"full_name": "AliBrTab\/CVE-2023-46747-POC",
"owner": {
"login": "AliBrTab",
"id": 149408980,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149408980?v=4",
"html_url": "https:\/\/github.com\/AliBrTab"
},
"html_url": "https:\/\/github.com\/AliBrTab\/CVE-2023-46747-POC",
"description": "F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!",
"fork": false,
"created_at": "2023-10-30T15:50:46Z",
"updated_at": "2023-10-30T16:00:27Z",
"pushed_at": "2023-10-30T15:56:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -214,7 +214,7 @@
"fork": false,
"created_at": "2023-10-28T11:44:42Z",
"updated_at": "2023-10-30T09:34:35Z",
"pushed_at": "2023-10-30T08:45:33Z",
"pushed_at": "2023-10-30T13:43:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-26T06:56:48Z",
"updated_at": "2023-10-29T02:59:17Z",
"updated_at": "2023-10-30T13:51:31Z",
"pushed_at": "2023-10-26T06:58:36Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -1491,6 +1491,7 @@
- [yTxZx/CVE-2023-23752](https://github.com/yTxZx/CVE-2023-23752)
- [AlissoftCodes/CVE-2023-23752](https://github.com/AlissoftCodes/CVE-2023-23752)
- [Pushkarup/CVE-2023-23752](https://github.com/Pushkarup/CVE-2023-23752)
- [cybernetwiz/CVE-2023-23752](https://github.com/cybernetwiz/CVE-2023-23752)
### CVE-2023-23924 (2023-01-31)
@ -4104,6 +4105,13 @@
- [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989)
### CVE-2023-41064 (2023-09-07)
<code>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
</code>
- [MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064](https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064)
### CVE-2023-41080 (2023-08-25)
<code>URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.\n\nThe vulnerability is limited to the ROOT (default) web application.
@ -4804,6 +4812,15 @@
### CVE-2023-46478
- [mr-xmen786/CVE-2023-46478](https://github.com/mr-xmen786/CVE-2023-46478)
### CVE-2023-46747 (2023-10-26)
<code>\n\n\nUndisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n
</code>
- [TomArn1/CVE-2023-46747-PoC](https://github.com/TomArn1/CVE-2023-46747-PoC)
- [k0zulzr/CVE-2023-46747-Mass-RCE](https://github.com/k0zulzr/CVE-2023-46747-Mass-RCE)
- [AliBrTab/CVE-2023-46747-POC](https://github.com/AliBrTab/CVE-2023-46747-POC)
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@ -12892,6 +12909,7 @@
- [ChrisPritchard/CVE-2021-22911-rust](https://github.com/ChrisPritchard/CVE-2021-22911-rust)
- [MrDottt/CVE-2021-22911](https://github.com/MrDottt/CVE-2021-22911)
- [overgrowncarrot1/CVE-2021-22911](https://github.com/overgrowncarrot1/CVE-2021-22911)
- [vlrhsgody/-vlrhsgody-RocketChat-CVE-2021-22911-](https://github.com/vlrhsgody/-vlrhsgody-RocketChat-CVE-2021-22911-)
### CVE-2021-22924 (2021-08-05)
@ -36183,6 +36201,13 @@
- [alt3kx/CVE-2007-6638](https://github.com/alt3kx/CVE-2007-6638)
### CVE-2007-6750 (2011-12-27)
<code>The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
</code>
- [Jeanpseven/slowl0ris](https://github.com/Jeanpseven/slowl0ris)
## 2006
### CVE-2006-0450 (2006-01-26)