Auto Update 2022/08/19 12:19:08

This commit is contained in:
motikan2010-bot 2022-08-19 21:19:08 +09:00
parent 1b6aac65fd
commit af4391160e
34 changed files with 177 additions and 175 deletions

View file

@ -1,30 +0,0 @@
[
{
"id": 518704833,
"name": "Network-Filesystem-Forensics",
"full_name": "gilberto47831\/Network-Filesystem-Forensics",
"owner": {
"login": "gilberto47831",
"id": 60636483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60636483?v=4",
"html_url": "https:\/\/github.com\/gilberto47831"
},
"html_url": "https:\/\/github.com\/gilberto47831\/Network-Filesystem-Forensics",
"description": "Reports on post-exploitation on honeypot exploiting vulnerable wu-ftpd (CVE-2001-0550)",
"fork": false,
"created_at": "2022-07-28T04:52:58Z",
"updated_at": "2022-07-28T04:52:58Z",
"pushed_at": "2022-08-08T21:40:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

32
2009/CVE-2009-4623.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 526549283,
"name": "CVE-2009-4623",
"full_name": "hupe1980\/CVE-2009-4623",
"owner": {
"login": "hupe1980",
"id": 24973437,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4",
"html_url": "https:\/\/github.com\/hupe1980"
},
"html_url": "https:\/\/github.com\/hupe1980\/CVE-2009-4623",
"description": "PoC Advanced Comment System 1.0 - Remote Command Execution (RCE) ",
"fork": false,
"created_at": "2022-08-19T09:46:03Z",
"updated_at": "2022-08-19T10:18:50Z",
"pushed_at": "2022-08-19T10:17:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2009-4623"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-02-11T15:09:32Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 32,
"score": 0
}

View file

@ -97,10 +97,10 @@
"description": "CVE-2013-2028 python exploit",
"fork": false,
"created_at": "2020-06-27T15:08:26Z",
"updated_at": "2022-08-06T05:52:31Z",
"updated_at": "2022-08-19T07:46:08Z",
"pushed_at": "2020-06-27T15:08:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -113,7 +113,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2022-08-10T09:23:53Z",
"updated_at": "2022-08-19T10:42:39Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2280,
"watchers_count": 2280,
"forks_count": 484,
"stargazers_count": 2279,
"watchers_count": 2279,
"forks_count": 485,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 484,
"watchers": 2280,
"forks": 485,
"watchers": 2279,
"score": 0
},
{

File diff suppressed because one or more lines are too long

View file

@ -13,7 +13,7 @@
"description": "Experiments related to CVE-2015-3456",
"fork": false,
"created_at": "2015-05-17T20:14:47Z",
"updated_at": "2022-08-18T07:17:35Z",
"updated_at": "2022-08-19T11:11:54Z",
"pushed_at": "2015-05-27T13:58:46Z",
"stargazers_count": 12,
"watchers_count": 12,

View file

@ -186,10 +186,10 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2022-07-27T07:08:27Z",
"updated_at": "2022-08-19T07:36:50Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 316,
"watchers_count": 316,
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
@ -197,7 +197,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 316,
"watchers": 317,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
"updated_at": "2022-07-29T07:40:59Z",
"updated_at": "2022-08-19T06:45:04Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 328,
"watchers_count": 328,
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 328,
"watchers": 329,
"score": 0
},
{

View file

@ -1123,10 +1123,10 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2022-07-28T13:40:48Z",
"updated_at": "2022-08-19T07:38:37Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 479,
"watchers_count": 479,
"stargazers_count": 480,
"watchers_count": 480,
"forks_count": 189,
"allow_forking": true,
"is_template": false,
@ -1134,7 +1134,7 @@
"topics": [],
"visibility": "public",
"forks": 189,
"watchers": 479,
"watchers": 480,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-19T04:50:29Z",
"updated_at": "2022-08-19T09:57:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3492,
"watchers_count": 3492,
"stargazers_count": 3493,
"watchers_count": 3493,
"forks_count": 1030,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1030,
"watchers": 3492,
"watchers": 3493,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "CVE-2019-2729 Exploit Script",
"fork": false,
"created_at": "2020-02-19T03:49:51Z",
"updated_at": "2022-06-17T01:45:03Z",
"updated_at": "2022-08-19T10:14:38Z",
"pushed_at": "2020-02-19T08:48:02Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-09-01T08:56:40Z",
"stargazers_count": 647,
"watchers_count": 647,
"forks_count": 138,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 138,
"forks": 137,
"watchers": 647,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-19T04:50:29Z",
"updated_at": "2022-08-19T09:57:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3492,
"watchers_count": 3492,
"stargazers_count": 3493,
"watchers_count": 3493,
"forks_count": 1030,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1030,
"watchers": 3492,
"watchers": 3493,
"score": 0
},
{

View file

@ -129,7 +129,7 @@
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 984,
"watchers_count": 984,
"forks_count": 313,
"forks_count": 314,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -139,7 +139,7 @@
"poc"
],
"visibility": "public",
"forks": 313,
"forks": 314,
"watchers": 984,
"score": 0
}

View file

@ -129,7 +129,7 @@
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 984,
"watchers_count": 984,
"forks_count": 313,
"forks_count": 314,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -139,7 +139,7 @@
"poc"
],
"visibility": "public",
"forks": 313,
"forks": 314,
"watchers": 984,
"score": 0
},

View file

@ -1004,10 +1004,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-08-17T11:39:13Z",
"updated_at": "2022-08-19T09:22:10Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 528,
"watchers_count": 528,
"stargazers_count": 529,
"watchers_count": 529,
"forks_count": 145,
"allow_forking": true,
"is_template": false,
@ -1015,7 +1015,7 @@
"topics": [],
"visibility": "public",
"forks": 145,
"watchers": 528,
"watchers": 529,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2022-08-15T15:42:25Z",
"updated_at": "2022-08-19T08:53:37Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 139,
"watchers": 140,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-04-19T10:30:13Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 7,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-4154 exploit",
"fork": false,
"created_at": "2022-08-11T05:46:27Z",
"updated_at": "2022-08-18T01:13:52Z",
"updated_at": "2022-08-19T10:49:11Z",
"pushed_at": "2022-08-11T06:00:10Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-08-16T00:16:09Z",
"updated_at": "2022-08-19T09:25:18Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 830,
"watchers_count": 830,
"stargazers_count": 832,
"watchers_count": 832,
"forks_count": 175,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 175,
"watchers": 830,
"watchers": 832,
"score": 0
},
{
@ -50,13 +50,13 @@
"pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 76,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 76,
"forks": 77,
"watchers": 382,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
"updated_at": "2022-08-10T19:17:56Z",
"updated_at": "2022-08-19T08:55:56Z",
"pushed_at": "2022-07-25T20:41:30Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 26,
"watchers": 27,
"score": 0
},
{
@ -961,10 +961,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-07-21T17:40:46Z",
"updated_at": "2022-08-19T09:52:12Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 623,
"watchers_count": 623,
"stargazers_count": 624,
"watchers_count": 624,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
@ -984,7 +984,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 623,
"watchers": 624,
"score": 0
},
{
@ -1778,18 +1778,18 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T04:14:18Z",
"updated_at": "2022-08-16T20:12:20Z",
"updated_at": "2022-08-19T09:01:04Z",
"pushed_at": "2022-01-21T11:43:49Z",
"stargazers_count": 257,
"watchers_count": 257,
"forks_count": 88,
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 88,
"watchers": 257,
"forks": 89,
"watchers": 258,
"score": 0
},
{
@ -2434,10 +2434,10 @@
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
"fork": false,
"created_at": "2021-12-13T21:39:51Z",
"updated_at": "2022-08-05T14:35:31Z",
"updated_at": "2022-08-19T11:54:42Z",
"pushed_at": "2021-12-21T01:24:46Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@ -2445,7 +2445,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 283,
"watchers": 284,
"score": 0
},
{
@ -6008,10 +6008,10 @@
"description": "log4j2 RCE漏洞CVE-2021-44228)内网扫描器可用于在不出网的条件下进行漏洞扫描帮助企业内部快速发现Log4jShell漏洞。",
"fork": false,
"created_at": "2021-12-20T13:41:35Z",
"updated_at": "2022-08-02T01:43:17Z",
"updated_at": "2022-08-19T11:08:38Z",
"pushed_at": "2021-12-21T06:11:58Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -6019,7 +6019,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0
},
{

View file

@ -73,13 +73,13 @@
"pushed_at": "2022-08-06T12:40:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2022-08-19T02:54:39Z",
"updated_at": "2022-08-19T10:20:51Z",
"pushed_at": "2022-08-03T08:39:29Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 142,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 142,
"watchers": 322,
"watchers": 323,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22947",
"fork": false,
"created_at": "2022-03-02T11:58:55Z",
"updated_at": "2022-08-15T15:42:11Z",
"updated_at": "2022-08-19T07:17:12Z",
"pushed_at": "2022-03-03T14:03:30Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 182,
"watchers": 183,
"score": 0
},
{
@ -1286,10 +1286,10 @@
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行CVE-2022-22947 注入哥斯拉内存马",
"fork": false,
"created_at": "2022-05-16T15:27:41Z",
"updated_at": "2022-08-14T06:33:48Z",
"updated_at": "2022-08-19T09:26:23Z",
"pushed_at": "2022-05-16T15:33:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -1297,7 +1297,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-08-18T14:42:42Z",
"updated_at": "2022-08-19T10:49:05Z",
"pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 30,
"watchers": 32,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-19T02:49:04Z",
"updated_at": "2022-08-19T07:18:05Z",
"pushed_at": "2022-08-15T07:00:18Z",
"stargazers_count": 668,
"watchers_count": 668,
"stargazers_count": 669,
"watchers_count": 669,
"forks_count": 126,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 126,
"watchers": 668,
"watchers": 669,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2022-08-19T03:54:23Z",
"updated_at": "2022-08-19T11:37:12Z",
"pushed_at": "2022-08-19T00:41:08Z",
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 20,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 92,
"forks": 23,
"watchers": 114,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-13T18:54:58Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 43,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
"fork": false,
"created_at": "2022-07-21T13:09:50Z",
"updated_at": "2022-08-19T00:33:45Z",
"updated_at": "2022-08-19T09:32:26Z",
"pushed_at": "2022-07-21T13:44:32Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 6,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 72,
"forks": 7,
"watchers": 73,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "CVE",
"fork": false,
"created_at": "2022-08-10T03:21:19Z",
"updated_at": "2022-08-18T16:26:04Z",
"updated_at": "2022-08-19T07:01:08Z",
"pushed_at": "2022-08-10T03:25:06Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "This is working POC of CVE-2022-36271 ",
"fork": false,
"created_at": "2022-08-16T19:48:36Z",
"updated_at": "2022-08-19T05:35:55Z",
"updated_at": "2022-08-19T11:05:39Z",
"pushed_at": "2022-08-16T19:54:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-18T18:39:39Z",
"updated_at": "2022-08-19T03:16:01Z",
"updated_at": "2022-08-19T11:08:11Z",
"pushed_at": "2022-08-18T18:41:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -27472,6 +27472,14 @@ The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does n
- [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137)
### CVE-2009-4623 (2010-01-18)
<code>
Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) index.php and (2) admin.php in advanced_comment_system/. NOTE: this might only be a vulnerability when the administrator has not followed installation instructions in install.php. NOTE: this might be the same as CVE-2020-35598.
</code>
- [hupe1980/CVE-2009-4623](https://github.com/hupe1980/CVE-2009-4623)
### CVE-2009-4660 (2010-03-03)
<code>
@ -28062,14 +28070,6 @@ The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the clie
## 2001
### CVE-2001-0550 (2002-06-25)
<code>
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a &quot;~{&quot; argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).
</code>
- [gilberto47831/Network-Filesystem-Forensics](https://github.com/gilberto47831/Network-Filesystem-Forensics)
### CVE-2001-0680 (2002-03-09)
<code>