Auto Update 2023/09/26 18:31:50

This commit is contained in:
motikan2010-bot 2023-09-27 03:31:50 +09:00
parent d3aa8c530c
commit af6090ce93
40 changed files with 383 additions and 133 deletions

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -28,5 +28,35 @@
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 55105611,
"name": "certPinningVulnerableOkHttp",
"full_name": "ikoz\/certPinningVulnerableOkHttp",
"owner": {
"login": "ikoz",
"id": 9115937,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9115937?v=4",
"html_url": "https:\/\/github.com\/ikoz"
},
"html_url": "https:\/\/github.com\/ikoz\/certPinningVulnerableOkHttp",
"description": "OkHttp sample app vulnerable to CVE-2016-2402",
"fork": false,
"created_at": "2016-03-30T23:45:06Z",
"updated_at": "2018-11-30T02:52:33Z",
"pushed_at": "2016-03-31T00:15:36Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-09-23T13:06:59Z",
"updated_at": "2023-09-26T14:13:37Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 764,
"watchers_count": 764,
"stargazers_count": 765,
"watchers_count": 765,
"has_discussions": false,
"forks_count": 436,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 436,
"watchers": 764,
"watchers": 765,
"score": 0,
"subscribers_count": 11
},
@ -811,10 +811,10 @@
"description": "编译好的脏牛漏洞CVE-2016-5195EXP",
"fork": false,
"created_at": "2018-05-27T08:06:50Z",
"updated_at": "2023-09-08T07:05:08Z",
"updated_at": "2023-09-26T14:11:13Z",
"pushed_at": "2018-05-27T08:24:17Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -823,7 +823,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 127,
"watchers": 128,
"score": 0,
"subscribers_count": 1
},

View file

@ -29,6 +29,66 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 80717942,
"name": "extra_recipe",
"full_name": "JackBro\/extra_recipe",
"owner": {
"login": "JackBro",
"id": 21210712,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4",
"html_url": "https:\/\/github.com\/JackBro"
},
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
"fork": false,
"created_at": "2017-02-02T11:16:38Z",
"updated_at": "2017-10-14T08:34:32Z",
"pushed_at": "2017-01-27T17:44:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 81874110,
"name": "extra_recipe-iOS-10.2",
"full_name": "Rootkitsmm-zz\/extra_recipe-iOS-10.2",
"owner": {
"login": "Rootkitsmm-zz",
"id": 5567904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4",
"html_url": "https:\/\/github.com\/Rootkitsmm-zz"
},
"html_url": "https:\/\/github.com\/Rootkitsmm-zz\/extra_recipe-iOS-10.2",
"description": "CVE-2017-2370",
"fork": false,
"created_at": "2017-02-13T21:32:40Z",
"updated_at": "2019-01-03T05:45:15Z",
"pushed_at": "2017-02-01T11:36:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 142854846,
"name": "CVE-2017-2370",

View file

@ -1,4 +1,34 @@
[
{
"id": 84158718,
"name": "S2-045",
"full_name": "PolarisLab\/S2-045",
"owner": {
"login": "PolarisLab",
"id": 25890110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
"html_url": "https:\/\/github.com\/PolarisLab"
},
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
"description": "Struts2 S2-045CVE-2017-5638Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
"fork": false,
"created_at": "2017-03-07T05:30:30Z",
"updated_at": "2022-03-22T17:04:53Z",
"pushed_at": "2017-03-07T05:37:55Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},
{
"id": 84186490,
"name": "Struts2-045-Exp",

View file

@ -343,10 +343,10 @@
"description": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.",
"fork": false,
"created_at": "2022-07-18T05:14:55Z",
"updated_at": "2023-04-27T13:48:37Z",
"updated_at": "2023-09-26T13:54:53Z",
"pushed_at": "2022-07-18T05:36:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-09-19T01:29:40Z",
"updated_at": "2023-09-26T15:05:50Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1148,
"watchers_count": 1148,
"stargazers_count": 1149,
"watchers_count": 1149,
"has_discussions": false,
"forks_count": 355,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1148,
"watchers": 1149,
"score": 0,
"subscribers_count": 69
},
@ -3107,10 +3107,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2023-09-21T17:52:36Z",
"updated_at": "2023-09-26T15:09:19Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -3119,7 +3119,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 109,
"watchers": 110,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2023-09-16T21:19:19Z",
"updated_at": "2023-09-26T16:14:55Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 204,
"watchers": 205,
"score": 0,
"subscribers_count": 12
},

View file

@ -43,10 +43,10 @@
"description": "Exploit for CVE-2020-15778(OpenSSH vul)",
"fork": false,
"created_at": "2021-07-15T01:04:24Z",
"updated_at": "2023-09-01T02:29:21Z",
"updated_at": "2023-09-26T14:09:23Z",
"pushed_at": "2022-02-18T08:04:46Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -166,10 +166,10 @@
"description": null,
"fork": false,
"created_at": "2020-12-30T17:23:20Z",
"updated_at": "2023-09-16T21:40:50Z",
"updated_at": "2023-09-26T14:49:24Z",
"pushed_at": "2020-12-30T17:24:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -178,7 +178,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -306,13 +306,13 @@
"stargazers_count": 935,
"watchers_count": 935,
"has_discussions": false,
"forks_count": 229,
"forks_count": 230,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 229,
"forks": 230,
"watchers": 935,
"score": 0,
"subscribers_count": 26

View file

@ -43,10 +43,10 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
"updated_at": "2023-09-16T21:48:39Z",
"updated_at": "2023-09-26T14:01:33Z",
"pushed_at": "2022-03-21T13:23:03Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 22,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,7 +138,7 @@
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 100,
"forks_count": 99,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -146,7 +146,7 @@
"cve-2021-22205"
],
"visibility": "public",
"forks": 100,
"forks": 99,
"watchers": 241,
"score": 0,
"subscribers_count": 3

View file

@ -43,10 +43,10 @@
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
"fork": false,
"created_at": "2022-04-15T04:23:44Z",
"updated_at": "2023-09-16T21:52:54Z",
"updated_at": "2023-09-26T15:08:13Z",
"pushed_at": "2022-04-15T08:52:11Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},
@ -193,10 +193,10 @@
"description": "S2-061\/S2-062 Struts2 远程命令执行漏洞 POC&EXP",
"fork": false,
"created_at": "2022-07-10T14:48:52Z",
"updated_at": "2023-08-04T05:23:28Z",
"updated_at": "2023-09-26T15:25:53Z",
"pushed_at": "2022-07-23T15:31:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2023-09-23T04:47:34Z",
"updated_at": "2023-09-26T18:20:04Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 207,
"watchers": 208,
"score": 0,
"subscribers_count": 5
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-09-25T03:52:39Z",
"updated_at": "2023-09-26T18:18:47Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 641,
"watchers_count": 641,
"stargazers_count": 642,
"watchers_count": 642,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 641,
"watchers": 642,
"score": 0,
"subscribers_count": 12
},

View file

@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-09-22T09:36:33Z",
"updated_at": "2023-09-26T12:53:56Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 730,
"watchers_count": 730,
"stargazers_count": 731,
"watchers_count": 731,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 116,
"watchers": 730,
"watchers": 731,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2023-09-16T21:51:05Z",
"updated_at": "2023-09-26T18:27:42Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 723,
"watchers_count": 723,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 155,
"watchers": 722,
"watchers": 723,
"score": 0,
"subscribers_count": 16
}

View file

@ -13,10 +13,10 @@
"description": "phpMyAdmin XSS ",
"fork": false,
"created_at": "2022-02-01T17:02:03Z",
"updated_at": "2023-09-16T21:50:54Z",
"updated_at": "2023-09-26T16:43:26Z",
"pushed_at": "2022-02-03T16:21:01Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2602",
"fork": false,
"created_at": "2022-11-18T18:53:27Z",
"updated_at": "2023-09-19T12:10:36Z",
"updated_at": "2023-09-26T12:51:34Z",
"pushed_at": "2022-12-22T11:21:11Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 86,
"watchers": 87,
"score": 0,
"subscribers_count": 3
},

View file

@ -232,10 +232,10 @@
"description": "😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.",
"fork": false,
"created_at": "2022-04-24T18:25:26Z",
"updated_at": "2023-09-16T21:53:09Z",
"updated_at": "2023-09-26T13:48:33Z",
"pushed_at": "2023-05-23T03:42:31Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -249,7 +249,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-09-26T07:16:58Z",
"updated_at": "2023-09-26T14:41:12Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 840,
"watchers_count": 840,
"stargazers_count": 839,
"watchers_count": 839,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 840,
"watchers": 839,
"score": 0,
"subscribers_count": 24
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-09-26T07:14:38Z",
"updated_at": "2023-09-26T18:04:54Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 444,
"watchers_count": 444,
"stargazers_count": 445,
"watchers_count": 445,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 444,
"watchers": 445,
"score": 0,
"subscribers_count": 10
},

View file

@ -48,10 +48,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T16:08:56Z",
"updated_at": "2023-09-20T18:52:48Z",
"updated_at": "2023-09-26T13:34:31Z",
"pushed_at": "2023-02-26T06:43:18Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 199,
"watchers_count": 199,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 200,
"watchers": 199,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "BlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748",
"fork": false,
"created_at": "2023-02-28T16:37:33Z",
"updated_at": "2023-05-02T16:58:03Z",
"updated_at": "2023-09-26T15:52:21Z",
"pushed_at": "2023-04-12T16:13:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

32
2023/CVE-2023-29357.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 696891493,
"name": "CVE-2023-29357",
"full_name": "Chocapikk\/CVE-2023-29357",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-29357",
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2023-09-26T16:18:56Z",
"pushed_at": "2023-09-26T18:07:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2023-09-26T12:29:57Z",
"updated_at": "2023-09-26T16:36:25Z",
"pushed_at": "2023-09-26T09:49:37Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 0,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Explore CVE 2023-30845 automatically across multiple subdomains",
"fork": false,
"created_at": "2023-09-22T01:14:20Z",
"updated_at": "2023-09-26T12:13:35Z",
"updated_at": "2023-09-26T15:02:25Z",
"pushed_at": "2023-09-22T01:48:19Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

32
2023/CVE-2023-32364.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 696847089,
"name": "CVE-2023-32364-macos-app-sandbox-escape",
"full_name": "gergelykalman\/CVE-2023-32364-macos-app-sandbox-escape",
"owner": {
"login": "gergelykalman",
"id": 1591209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1591209?v=4",
"html_url": "https:\/\/github.com\/gergelykalman"
},
"html_url": "https:\/\/github.com\/gergelykalman\/CVE-2023-32364-macos-app-sandbox-escape",
"description": "Exploit for CVE-2023-32364",
"fork": false,
"created_at": "2023-09-26T14:42:00Z",
"updated_at": "2023-09-26T17:27:28Z",
"pushed_at": "2023-09-26T14:44:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-09-22T18:44:00Z",
"updated_at": "2023-09-26T18:02:50Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 418,
"watchers_count": 418,
"stargazers_count": 419,
"watchers_count": 419,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 418,
"watchers": 419,
"score": 0,
"subscribers_count": 16
}

View file

@ -13,10 +13,10 @@
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
"fork": false,
"created_at": "2023-09-01T07:41:23Z",
"updated_at": "2023-09-26T10:23:22Z",
"updated_at": "2023-09-26T16:00:18Z",
"pushed_at": "2023-09-01T07:48:43Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 101,
"watchers": 105,
"score": 0,
"subscribers_count": 5
},

View file

@ -172,10 +172,10 @@
"description": "RCE exploit for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T20:17:43Z",
"updated_at": "2023-09-18T20:44:04Z",
"updated_at": "2023-09-26T15:29:46Z",
"pushed_at": "2023-08-23T16:27:28Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -184,7 +184,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 189,
"watchers": 190,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-09-26T11:39:05Z",
"updated_at": "2023-09-26T11:39:05Z",
"pushed_at": "2023-09-26T12:32:25Z",
"pushed_at": "2023-09-26T17:24:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "A tool to discover Juniper firewalls vulnerable to CVE-2023-36845",
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2023-09-26T03:01:27Z",
"updated_at": "2023-09-26T14:00:16Z",
"pushed_at": "2023-09-17T09:14:32Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -27,8 +27,55 @@
],
"visibility": "public",
"forks": 4,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 1
},
{
"id": 696932971,
"name": "CVE-2023-36845",
"full_name": "kljunowsky\/CVE-2023-36845",
"owner": {
"login": "kljunowsky",
"id": 104329412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4",
"html_url": "https:\/\/github.com\/kljunowsky"
},
"html_url": "https:\/\/github.com\/kljunowsky\/CVE-2023-36845",
"description": "Python script to check if Juniper Firewalls are vulnerable to CVE-2023-36845 - RCE",
"fork": false,
"created_at": "2023-09-26T17:56:55Z",
"updated_at": "2023-09-26T18:00:29Z",
"pushed_at": "2023-09-26T18:00:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bug-bounty-hunting",
"bugbounty",
"bugbountytips",
"bugbountytricks",
"cve-2023-36845",
"cybersecurity",
"hacking",
"jupiter",
"jupiter-firewall",
"poc",
"proof-of-concept",
"rce",
"remote-code-execution",
"remote-command-execution",
"security",
"web-application-security"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-09-26T03:27:30Z",
"updated_at": "2023-09-26T13:49:25Z",
"pushed_at": "2023-09-17T02:17:52Z",
"stargazers_count": 651,
"watchers_count": 651,
"stargazers_count": 652,
"watchers_count": 652,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 116,
"watchers": 651,
"watchers": 652,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-09-16T01:28:58Z",
"updated_at": "2023-09-26T02:27:47Z",
"pushed_at": "2023-09-26T05:42:40Z",
"pushed_at": "2023-09-26T15:32:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-09-16T01:05:16Z",
"updated_at": "2023-09-22T15:02:18Z",
"pushed_at": "2023-09-22T15:04:03Z",
"pushed_at": "2023-09-26T15:31:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/ahrixia"
},
"html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-43326",
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on admin dashboard login function.",
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on Multiple URLs.",
"fork": false,
"created_at": "2023-09-19T03:38:25Z",
"updated_at": "2023-09-22T15:20:26Z",
"pushed_at": "2023-09-22T15:20:11Z",
"updated_at": "2023-09-26T16:13:12Z",
"pushed_at": "2023-09-26T16:14:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2023-09-26T12:12:43Z",
"updated_at": "2023-09-26T17:13:21Z",
"pushed_at": "2023-09-22T04:31:47Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 136,
"watchers": 138,
"score": 0,
"subscribers_count": 5
},

View file

@ -1838,6 +1838,13 @@
- [Wh04m1001/CVE-2023-29343](https://github.com/Wh04m1001/CVE-2023-29343)
### CVE-2023-29357 (2023-06-13)
<code>Microsoft SharePoint Server Elevation of Privilege Vulnerability
</code>
- [Chocapikk/CVE-2023-29357](https://github.com/Chocapikk/CVE-2023-29357)
### CVE-2023-29360 (2023-06-13)
<code>Microsoft Streaming Service Elevation of Privilege Vulnerability
@ -2361,6 +2368,13 @@
- [86x/CVE-2023-32353-PoC](https://github.com/86x/CVE-2023-32353-PoC)
### CVE-2023-32364 (2023-07-26)
<code>A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.5. A sandboxed process may be able to circumvent sandbox restrictions.
</code>
- [gergelykalman/CVE-2023-32364-macos-app-sandbox-escape](https://github.com/gergelykalman/CVE-2023-32364-macos-app-sandbox-escape)
### CVE-2023-32560 (2023-08-10)
<code>An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution.\n\nThanks to a Researcher at Tenable for finding and reporting.\n\nFixed in version 6.4.1.
@ -3044,6 +3058,7 @@
</code>
- [vulncheck-oss/cve-2023-36845-scanner](https://github.com/vulncheck-oss/cve-2023-36845-scanner)
- [kljunowsky/CVE-2023-36845](https://github.com/kljunowsky/CVE-2023-36845)
### CVE-2023-36846 (2023-08-17)
@ -28536,6 +28551,8 @@
</code>
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
### CVE-2017-2388 (2017-04-01)
@ -28768,6 +28785,7 @@
<code>The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
</code>
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
@ -30871,6 +30889,7 @@
</code>
- [ikoz/cert-pinning-flaw-poc](https://github.com/ikoz/cert-pinning-flaw-poc)
- [ikoz/certPinningVulnerableOkHttp](https://github.com/ikoz/certPinningVulnerableOkHttp)
### CVE-2016-2431 (2016-05-09)