mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/12/30 12:31:28
This commit is contained in:
parent
a33661459a
commit
c02ee14e14
41 changed files with 654 additions and 122 deletions
|
@ -133,19 +133,19 @@
|
|||
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T04:01:56Z",
|
||||
"updated_at": "2023-11-15T13:01:56Z",
|
||||
"updated_at": "2023-12-30T09:21:49Z",
|
||||
"pushed_at": "2021-09-28T16:14:13Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 35,
|
||||
"forks": 12,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1158,10 +1158,10 @@
|
|||
"description": "Shellshock exploit + vulnerable environment",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-07T23:38:50Z",
|
||||
"updated_at": "2023-12-04T11:19:34Z",
|
||||
"updated_at": "2023-12-30T08:25:07Z",
|
||||
"pushed_at": "2023-05-11T02:12:25Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -1177,7 +1177,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
32
2016/CVE-2016-0701.json
Normal file
32
2016/CVE-2016-0701.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 50957830,
|
||||
"name": "cve-2016-0701",
|
||||
"full_name": "luanjampa\/cve-2016-0701",
|
||||
"owner": {
|
||||
"login": "luanjampa",
|
||||
"id": 4728927,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4728927?v=4",
|
||||
"html_url": "https:\/\/github.com\/luanjampa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-02-02T22:53:34Z",
|
||||
"updated_at": "2016-02-15T06:03:46Z",
|
||||
"pushed_at": "2016-02-24T17:32:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -119,6 +119,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 50619014,
|
||||
"name": "cve-2016-0728-testbed",
|
||||
"full_name": "neuschaefer\/cve-2016-0728-testbed",
|
||||
"owner": {
|
||||
"login": "neuschaefer",
|
||||
"id": 1021512,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1021512?v=4",
|
||||
"html_url": "https:\/\/github.com\/neuschaefer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/neuschaefer\/cve-2016-0728-testbed",
|
||||
"description": "A testbed for CVE-2016-0728, a refcount leak\/overflow bug in Linux",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-28T22:38:13Z",
|
||||
"updated_at": "2023-02-16T19:24:26Z",
|
||||
"pushed_at": "2016-01-29T00:48:38Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 53915696,
|
||||
"name": "cve-2016-0728",
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 56596683,
|
||||
"name": "CVE-2016-0846-PoC",
|
||||
"full_name": "b0b0505\/CVE-2016-0846-PoC",
|
||||
"owner": {
|
||||
"login": "b0b0505",
|
||||
"id": 6748041,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6748041?v=4",
|
||||
"html_url": "https:\/\/github.com\/b0b0505"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b0b0505\/CVE-2016-0846-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-04-19T12:56:44Z",
|
||||
"updated_at": "2016-04-27T18:05:22Z",
|
||||
"pushed_at": "2016-04-19T13:01:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
32
2016/CVE-2016-2118.json
Normal file
32
2016/CVE-2016-2118.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 56461631,
|
||||
"name": "cfengine-CVE-2016-2118",
|
||||
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
|
||||
"owner": {
|
||||
"login": "nickanderson",
|
||||
"id": 202896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickanderson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
|
||||
"description": "An example detection and remediation policy.",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-17T22:22:04Z",
|
||||
"updated_at": "2016-04-18T02:57:44Z",
|
||||
"pushed_at": "2016-04-19T14:24:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2016/CVE-2016-3141.json
Normal file
32
2016/CVE-2016-3141.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 56758577,
|
||||
"name": "CVE-2016-3141",
|
||||
"full_name": "peternguyen93\/CVE-2016-3141",
|
||||
"owner": {
|
||||
"login": "peternguyen93",
|
||||
"id": 1802870,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
|
||||
"html_url": "https:\/\/github.com\/peternguyen93"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
|
||||
"description": "CVE-2016-3141",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-21T08:59:05Z",
|
||||
"updated_at": "2023-03-11T18:41:15Z",
|
||||
"pushed_at": "2016-04-23T15:55:01Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -199,10 +199,10 @@
|
|||
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T10:04:30Z",
|
||||
"updated_at": "2023-10-23T06:43:58Z",
|
||||
"updated_at": "2023-12-30T09:27:56Z",
|
||||
"pushed_at": "2019-10-16T12:20:53Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -211,7 +211,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -349,10 +349,10 @@
|
|||
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T21:11:27Z",
|
||||
"updated_at": "2023-12-26T03:25:15Z",
|
||||
"updated_at": "2023-12-30T09:26:26Z",
|
||||
"pushed_at": "2022-01-02T20:40:58Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -371,7 +371,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -261,5 +261,35 @@
|
|||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 737270169,
|
||||
"name": "CVE-2021-21551",
|
||||
"full_name": "houseofxyz\/CVE-2021-21551",
|
||||
"owner": {
|
||||
"login": "houseofxyz",
|
||||
"id": 121667935,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121667935?v=4",
|
||||
"html_url": "https:\/\/github.com\/houseofxyz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/houseofxyz\/CVE-2021-21551",
|
||||
"description": "Dell dbutil_2_3.sys driver exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-30T12:23:23Z",
|
||||
"updated_at": "2023-12-30T12:23:23Z",
|
||||
"pushed_at": "2023-12-30T12:23:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T04:39:58Z",
|
||||
"updated_at": "2023-12-26T09:54:28Z",
|
||||
"updated_at": "2023-12-30T12:19:46Z",
|
||||
"pushed_at": "2023-11-12T16:29:03Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -29,6 +29,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414051484,
|
||||
"name": "cve-2021-24499",
|
||||
"full_name": "hh-hunter\/cve-2021-24499",
|
||||
"owner": {
|
||||
"login": "hh-hunter",
|
||||
"id": 91593280,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
|
||||
"html_url": "https:\/\/github.com\/hh-hunter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T03:07:31Z",
|
||||
"updated_at": "2021-10-06T03:45:29Z",
|
||||
"pushed_at": "2021-10-06T03:44:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 698068217,
|
||||
"name": "CVE-2021-24499",
|
||||
|
|
|
@ -58,5 +58,39 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 414009465,
|
||||
"name": "CVE-2021-27651",
|
||||
"full_name": "orangmuda\/CVE-2021-27651",
|
||||
"owner": {
|
||||
"login": "orangmuda",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/orangmuda"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
|
||||
"description": "bypass all stages of the password reset flow",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T23:33:50Z",
|
||||
"updated_at": "2023-09-28T11:32:04Z",
|
||||
"pushed_at": "2021-10-05T23:35:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"code-injection",
|
||||
"pega",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -29,6 +29,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 413892415,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "numanturle\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
|
||||
"description": "CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T16:18:09Z",
|
||||
"updated_at": "2023-12-08T12:43:35Z",
|
||||
"pushed_at": "2021-10-05T16:48:27Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 413901787,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "knqyf263\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
|
||||
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T16:45:41Z",
|
||||
"updated_at": "2023-12-08T12:43:35Z",
|
||||
"pushed_at": "2021-10-06T05:40:34Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 413916578,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
|
@ -95,6 +155,96 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 413943505,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "masahiro331\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "masahiro331",
|
||||
"id": 20438853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
|
||||
"html_url": "https:\/\/github.com\/masahiro331"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T18:56:04Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-06T03:43:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 413969845,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "j4k0m\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "j4k0m",
|
||||
"id": 48088579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
||||
"html_url": "https:\/\/github.com\/j4k0m"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
|
||||
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T20:30:01Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-05T22:06:50Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 413972926,
|
||||
"name": "POC-CVE-2021-41773",
|
||||
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "TishcaTpx",
|
||||
"id": 91351013,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
|
||||
"description": "Poc.py ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T20:41:34Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-05T21:29:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414013246,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
|
@ -192,6 +342,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414050354,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
|
||||
"owner": {
|
||||
"login": "habibiefaried",
|
||||
"id": 4345690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
|
||||
"html_url": "https:\/\/github.com\/habibiefaried"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
|
||||
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T03:01:41Z",
|
||||
"updated_at": "2023-09-28T11:32:04Z",
|
||||
"pushed_at": "2021-10-06T05:39:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414082287,
|
||||
"name": "CVE-2021-41773-POC",
|
||||
|
@ -222,6 +402,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414082633,
|
||||
"name": "cve-2021-41773-nse",
|
||||
"full_name": "TAI-REx\/cve-2021-41773-nse",
|
||||
"owner": {
|
||||
"login": "TAI-REx",
|
||||
"id": 78527947,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
|
||||
"html_url": "https:\/\/github.com\/TAI-REx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
|
||||
"description": "CVE-2021-41773.nse",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T05:36:22Z",
|
||||
"updated_at": "2021-11-26T18:07:10Z",
|
||||
"pushed_at": "2021-10-06T05:23:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 414108838,
|
||||
"name": "CVE-2021-41773",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-45744 - A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T15:36:21Z",
|
||||
"updated_at": "2022-01-14T18:37:56Z",
|
||||
"updated_at": "2023-12-30T08:24:30Z",
|
||||
"pushed_at": "2022-01-14T16:00:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T16:52:08Z",
|
||||
"updated_at": "2022-01-14T18:37:18Z",
|
||||
"updated_at": "2023-12-30T08:24:27Z",
|
||||
"pushed_at": "2022-01-14T16:52:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46067 - In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T17:19:09Z",
|
||||
"updated_at": "2022-01-14T18:33:43Z",
|
||||
"updated_at": "2023-12-30T08:23:32Z",
|
||||
"pushed_at": "2022-01-15T11:31:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46068 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T18:04:01Z",
|
||||
"updated_at": "2022-01-14T18:36:30Z",
|
||||
"updated_at": "2023-12-30T08:24:13Z",
|
||||
"pushed_at": "2022-01-14T19:34:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T18:27:00Z",
|
||||
"updated_at": "2022-01-14T18:29:45Z",
|
||||
"updated_at": "2023-12-30T08:24:23Z",
|
||||
"pushed_at": "2022-01-14T18:27:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46070 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T18:54:29Z",
|
||||
"updated_at": "2022-01-14T18:54:29Z",
|
||||
"updated_at": "2023-12-30T08:24:16Z",
|
||||
"pushed_at": "2022-01-14T19:32:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46071 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T19:09:36Z",
|
||||
"updated_at": "2022-01-14T19:09:36Z",
|
||||
"updated_at": "2023-12-30T08:24:20Z",
|
||||
"pushed_at": "2022-01-14T19:10:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46072 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T19:34:50Z",
|
||||
"updated_at": "2022-01-14T19:34:50Z",
|
||||
"updated_at": "2023-12-30T08:24:11Z",
|
||||
"pushed_at": "2022-01-14T19:35:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46073 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T19:49:07Z",
|
||||
"updated_at": "2022-01-14T19:49:07Z",
|
||||
"updated_at": "2023-12-30T08:24:07Z",
|
||||
"pushed_at": "2022-01-14T19:49:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46074 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T20:01:50Z",
|
||||
"updated_at": "2022-01-14T20:01:50Z",
|
||||
"updated_at": "2023-12-30T08:24:03Z",
|
||||
"pushed_at": "2022-01-14T20:02:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46075 - A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T20:15:28Z",
|
||||
"updated_at": "2022-01-14T20:15:28Z",
|
||||
"updated_at": "2023-12-30T08:24:01Z",
|
||||
"pushed_at": "2022-01-14T20:16:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46076 - Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T20:28:01Z",
|
||||
"updated_at": "2022-01-14T20:28:01Z",
|
||||
"updated_at": "2023-12-30T08:23:57Z",
|
||||
"pushed_at": "2022-01-14T20:28:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46078 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T20:49:42Z",
|
||||
"updated_at": "2022-01-14T20:49:42Z",
|
||||
"updated_at": "2023-12-30T08:23:53Z",
|
||||
"pushed_at": "2022-01-14T20:50:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46079 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T21:26:02Z",
|
||||
"updated_at": "2022-01-14T21:26:02Z",
|
||||
"updated_at": "2023-12-30T08:23:50Z",
|
||||
"pushed_at": "2022-01-14T21:27:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T21:45:58Z",
|
||||
"updated_at": "2022-01-14T21:45:58Z",
|
||||
"updated_at": "2023-12-30T08:23:46Z",
|
||||
"pushed_at": "2022-01-14T21:58:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T08:10:46Z",
|
||||
"updated_at": "2023-12-20T04:10:59Z",
|
||||
"updated_at": "2023-12-30T11:10:51Z",
|
||||
"pushed_at": "2022-09-04T17:28:56Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 320,
|
||||
"watchers": 319,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -264,7 +264,7 @@
|
|||
"description": "A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-27T00:36:16Z",
|
||||
"updated_at": "2023-11-10T03:25:45Z",
|
||||
"updated_at": "2023-12-30T09:42:45Z",
|
||||
"pushed_at": "2023-04-27T00:50:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-32947 walkthough and demo",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T08:21:47Z",
|
||||
"updated_at": "2023-12-28T09:13:34Z",
|
||||
"updated_at": "2023-12-30T12:15:10Z",
|
||||
"pushed_at": "2023-09-18T03:04:48Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 134,
|
||||
"watchers": 135,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-12-29T15:08:32Z",
|
||||
"updated_at": "2023-12-30T07:41:36Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 862,
|
||||
"watchers_count": 862,
|
||||
"stargazers_count": 861,
|
||||
"watchers_count": 861,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 862,
|
||||
"watchers": 861,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "CVE-2023-20198 Checkscript",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T08:00:18Z",
|
||||
"updated_at": "2023-12-03T18:18:08Z",
|
||||
"updated_at": "2023-12-30T09:37:12Z",
|
||||
"pushed_at": "2023-10-23T20:19:49Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "nuclei templates CVE RCE CNVD IoT",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-05T05:00:27Z",
|
||||
"updated_at": "2023-12-05T05:21:17Z",
|
||||
"updated_at": "2023-12-30T06:44:58Z",
|
||||
"pushed_at": "2023-12-06T13:48:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:51:27Z",
|
||||
"updated_at": "2023-10-29T00:10:16Z",
|
||||
"updated_at": "2023-12-30T09:44:46Z",
|
||||
"pushed_at": "2023-06-28T13:58:43Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
32
2023/CVE-2023-35985.json
Normal file
32
2023/CVE-2023-35985.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 737198469,
|
||||
"name": "-CVE-2023-35985",
|
||||
"full_name": "SpiralBL0CK\/-CVE-2023-35985",
|
||||
"owner": {
|
||||
"login": "SpiralBL0CK",
|
||||
"id": 25670930,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK\/-CVE-2023-35985",
|
||||
"description": " CVE-2023-35985 reproduction",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-30T06:35:21Z",
|
||||
"updated_at": "2023-12-30T06:35:21Z",
|
||||
"pushed_at": "2023-12-30T07:00:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-12T18:33:57Z",
|
||||
"updated_at": "2023-12-25T17:58:31Z",
|
||||
"updated_at": "2023-12-30T10:33:45Z",
|
||||
"pushed_at": "2023-09-07T08:37:04Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-17T14:18:54Z",
|
||||
"updated_at": "2023-12-29T06:47:46Z",
|
||||
"updated_at": "2023-12-30T09:21:14Z",
|
||||
"pushed_at": "2023-12-18T02:46:21Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": true,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 43,
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Postfix SMTP Smuggling - Expect Script POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-26T17:02:20Z",
|
||||
"updated_at": "2023-12-29T08:37:56Z",
|
||||
"updated_at": "2023-12-30T12:13:28Z",
|
||||
"pushed_at": "2023-12-26T20:16:45Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
40
README.md
40
README.md
|
@ -3808,6 +3808,13 @@
|
|||
- [datackmy/FallingSkies-CVE-2023-35885](https://github.com/datackmy/FallingSkies-CVE-2023-35885)
|
||||
- [Chocapikk/CVE-2023-35885](https://github.com/Chocapikk/CVE-2023-35885)
|
||||
|
||||
### CVE-2023-35985 (2023-11-27)
|
||||
|
||||
<code>An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
|
||||
</code>
|
||||
|
||||
- [SpiralBL0CK/-CVE-2023-35985](https://github.com/SpiralBL0CK/-CVE-2023-35985)
|
||||
|
||||
### CVE-2023-36025 (2023-11-14)
|
||||
|
||||
<code>Windows SmartScreen Security Feature Bypass Vulnerability
|
||||
|
@ -13985,6 +13992,7 @@
|
|||
- [ihack4falafel/Dell-Driver-EoP-CVE-2021-21551](https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551)
|
||||
- [tijme/kernel-mii](https://github.com/tijme/kernel-mii)
|
||||
- [nanabingies/CVE-2021-21551](https://github.com/nanabingies/CVE-2021-21551)
|
||||
- [houseofxyz/CVE-2021-21551](https://github.com/houseofxyz/CVE-2021-21551)
|
||||
|
||||
### CVE-2021-21716
|
||||
- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
|
||||
|
@ -14502,6 +14510,7 @@
|
|||
</code>
|
||||
|
||||
- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
|
||||
- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
|
||||
- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
|
||||
|
||||
### CVE-2021-24507 (2021-08-09)
|
||||
|
@ -15099,6 +15108,7 @@
|
|||
|
||||
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
|
||||
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
|
||||
- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
|
||||
|
||||
### CVE-2021-27850 (2021-04-15)
|
||||
|
||||
|
@ -17231,12 +17241,19 @@
|
|||
</code>
|
||||
|
||||
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
|
||||
- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
|
||||
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
|
||||
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
|
||||
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
|
||||
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
|
||||
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
|
||||
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
|
||||
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
|
||||
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
|
||||
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
|
||||
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
|
||||
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
|
||||
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
|
||||
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
|
||||
|
@ -33770,6 +33787,13 @@
|
|||
- [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln)
|
||||
- [BabyTeam1024/CVE-2016-0638](https://github.com/BabyTeam1024/CVE-2016-0638)
|
||||
|
||||
### CVE-2016-0701 (2016-02-14)
|
||||
|
||||
<code>The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
|
||||
</code>
|
||||
|
||||
- [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701)
|
||||
|
||||
### CVE-2016-0702 (2016-03-03)
|
||||
|
||||
<code>The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
|
||||
|
@ -33786,6 +33810,7 @@
|
|||
- [kennetham/cve_2016_0728](https://github.com/kennetham/cve_2016_0728)
|
||||
- [nardholio/cve-2016-0728](https://github.com/nardholio/cve-2016-0728)
|
||||
- [googleweb/CVE-2016-0728](https://github.com/googleweb/CVE-2016-0728)
|
||||
- [neuschaefer/cve-2016-0728-testbed](https://github.com/neuschaefer/cve-2016-0728-testbed)
|
||||
- [bittorrent3389/cve-2016-0728](https://github.com/bittorrent3389/cve-2016-0728)
|
||||
- [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728)
|
||||
- [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728)
|
||||
|
@ -33846,6 +33871,7 @@
|
|||
</code>
|
||||
|
||||
- [secmob/CVE-2016-0846](https://github.com/secmob/CVE-2016-0846)
|
||||
- [b0b0505/CVE-2016-0846-PoC](https://github.com/b0b0505/CVE-2016-0846-PoC)
|
||||
|
||||
### CVE-2016-0974 (2016-02-10)
|
||||
|
||||
|
@ -33976,6 +34002,13 @@
|
|||
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
|
||||
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
|
||||
|
||||
### CVE-2016-2118 (2016-04-12)
|
||||
|
||||
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
|
||||
</code>
|
||||
|
||||
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
|
||||
|
||||
### CVE-2016-2173 (2017-04-21)
|
||||
|
||||
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
|
||||
|
@ -34097,6 +34130,13 @@
|
|||
|
||||
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
|
||||
|
||||
### CVE-2016-3141 (2016-03-31)
|
||||
|
||||
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
|
||||
</code>
|
||||
|
||||
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
|
||||
|
||||
### CVE-2016-3238 (2016-07-12)
|
||||
|
||||
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability."
|
||||
|
|
Loading…
Add table
Reference in a new issue