mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/06/14 00:34:19
This commit is contained in:
parent
b4a7512be9
commit
c0aba0a80f
35 changed files with 245 additions and 183 deletions
|
@ -1120,10 +1120,10 @@
|
|||
"description": "Shellshock exploit + vulnerable environment",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-07T23:38:50Z",
|
||||
"updated_at": "2023-06-07T11:11:07Z",
|
||||
"updated_at": "2023-06-13T20:31:34Z",
|
||||
"pushed_at": "2023-05-11T02:12:25Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -1139,7 +1139,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -582,10 +582,10 @@
|
|||
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-20T05:28:04Z",
|
||||
"updated_at": "2023-05-28T19:51:40Z",
|
||||
"updated_at": "2023-06-14T00:11:22Z",
|
||||
"pushed_at": "2017-01-27T10:04:07Z",
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"has_discussions": false,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
|
@ -594,7 +594,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 104,
|
||||
"watchers": 259,
|
||||
"watchers": 258,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Public repository for improvements to the EXTRABACON exploit",
|
||||
"fork": false,
|
||||
"created_at": "2016-09-20T23:19:02Z",
|
||||
"updated_at": "2023-04-10T18:01:33Z",
|
||||
"updated_at": "2023-06-13T18:27:41Z",
|
||||
"pushed_at": "2016-11-02T03:11:27Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 157,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -110,10 +110,10 @@
|
|||
"description": "BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https:\/\/www.armis.com\/blueborne\/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https:\/\/www.armis.com\/blog\/ =============== Dependencies:",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-12T07:21:08Z",
|
||||
"updated_at": "2021-12-29T04:28:02Z",
|
||||
"updated_at": "2023-06-13T22:10:32Z",
|
||||
"pushed_at": "2020-11-04T16:49:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2023-04-19T05:35:46Z",
|
||||
"updated_at": "2023-06-13T21:51:50Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2023-06-08T08:21:26Z",
|
||||
"updated_at": "2023-06-13T21:38:03Z",
|
||||
"pushed_at": "2022-12-27T20:25:09Z",
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 348,
|
||||
"watchers": 349,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2023-06-11T01:21:09Z",
|
||||
"updated_at": "2023-06-13T19:11:51Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 484,
|
||||
"watchers_count": 484,
|
||||
"stargazers_count": 485,
|
||||
"watchers_count": 485,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 484,
|
||||
"watchers": 485,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T01:17:22Z",
|
||||
"updated_at": "2023-06-06T08:29:58Z",
|
||||
"updated_at": "2023-06-13T18:45:02Z",
|
||||
"pushed_at": "2022-12-22T01:40:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -198,13 +198,13 @@
|
|||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -469,13 +469,13 @@
|
|||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -110,10 +110,10 @@
|
|||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T10:05:36Z",
|
||||
"updated_at": "2023-04-28T08:37:20Z",
|
||||
"updated_at": "2023-06-13T23:40:35Z",
|
||||
"pushed_at": "2020-08-13T07:16:12Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -126,7 +126,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 172,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020–9934 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-27T22:09:01Z",
|
||||
"updated_at": "2022-11-02T18:30:02Z",
|
||||
"updated_at": "2023-06-13T22:04:25Z",
|
||||
"pushed_at": "2020-07-28T16:39:20Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 389496562,
|
||||
"name": "CVE-2021-33909",
|
||||
"full_name": "bbinfosec43\/CVE-2021-33909",
|
||||
"owner": {
|
||||
"login": "bbinfosec43",
|
||||
"id": 82197936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82197936?v=4",
|
||||
"html_url": "https:\/\/github.com\/bbinfosec43"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bbinfosec43\/CVE-2021-33909",
|
||||
"description": "Exploit code for CVE-2021-33909,Just a dump of removed https:\/\/github.com\/AmIAHuman\/ repo",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-26T03:24:35Z",
|
||||
"updated_at": "2022-07-12T14:51:35Z",
|
||||
"pushed_at": "2021-07-26T03:29:36Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 402293370,
|
||||
"name": "CVE-2021-33909",
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-29T12:37:31Z",
|
||||
"updated_at": "2023-06-13T01:23:10Z",
|
||||
"updated_at": "2023-06-13T21:14:50Z",
|
||||
"pushed_at": "2022-06-30T08:36:58Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -199,7 +199,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 425846665,
|
||||
"name": "CVE-2021-43361",
|
||||
"full_name": "bartutku\/CVE-2021-43361",
|
||||
"owner": {
|
||||
"login": "bartutku",
|
||||
"id": 15331732,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15331732?v=4",
|
||||
"html_url": "https:\/\/github.com\/bartutku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bartutku\/CVE-2021-43361",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-08T13:23:09Z",
|
||||
"updated_at": "2021-11-08T13:23:52Z",
|
||||
"pushed_at": "2021-11-08T13:23:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1175,7 +1175,7 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-06-08T06:45:00Z",
|
||||
"updated_at": "2023-06-13T23:54:49Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 416,
|
||||
"watchers_count": 416,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2023-06-13T06:49:13Z",
|
||||
"updated_at": "2023-06-13T23:09:23Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,10 +47,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-30T23:32:56Z",
|
||||
"updated_at": "2023-06-02T15:25:02Z",
|
||||
"updated_at": "2023-06-13T19:00:57Z",
|
||||
"pushed_at": "2022-11-01T19:56:40Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 167,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -80,13 +80,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Responsive FileManager v.9.9.5 vulnerable to CVE-2022-46604.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-03T08:56:16Z",
|
||||
"updated_at": "2023-06-09T05:36:33Z",
|
||||
"updated_at": "2023-06-13T20:27:19Z",
|
||||
"pushed_at": "2023-04-09T23:34:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept code for CVE-2023-2008",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T14:41:53Z",
|
||||
"updated_at": "2023-06-13T18:22:02Z",
|
||||
"updated_at": "2023-06-13T19:37:48Z",
|
||||
"pushed_at": "2023-06-12T15:04:02Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T13:17:23Z",
|
||||
"updated_at": "2023-06-13T18:29:57Z",
|
||||
"updated_at": "2023-06-14T00:30:41Z",
|
||||
"pushed_at": "2023-06-13T14:39:17Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"cve-2023-20887"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -201,5 +201,34 @@
|
|||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 653288165,
|
||||
"name": "CVE-2023-21716",
|
||||
"full_name": "Lord-of-the-IoT\/CVE-2023-21716",
|
||||
"owner": {
|
||||
"login": "Lord-of-the-IoT",
|
||||
"id": 109588583,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109588583?v=4",
|
||||
"html_url": "https:\/\/github.com\/Lord-of-the-IoT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Lord-of-the-IoT\/CVE-2023-21716",
|
||||
"description": "python program to exploit CVE-2023-21716",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T19:04:45Z",
|
||||
"updated_at": "2023-06-13T19:04:46Z",
|
||||
"pushed_at": "2023-06-13T19:04:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 35,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-06T14:05:09Z",
|
||||
"updated_at": "2023-06-13T17:06:01Z",
|
||||
"updated_at": "2023-06-13T18:35:21Z",
|
||||
"pushed_at": "2023-06-08T09:05:21Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -77,10 +77,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T09:00:16Z",
|
||||
"updated_at": "2023-06-12T13:26:30Z",
|
||||
"updated_at": "2023-06-13T19:17:37Z",
|
||||
"pushed_at": "2023-06-10T10:41:08Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -72,7 +72,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-06-06T02:59:22Z",
|
||||
"updated_at": "2023-06-06T03:03:03Z",
|
||||
"pushed_at": "2023-06-06T03:02:48Z",
|
||||
"pushed_at": "2023-06-13T22:16:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"vm-escape"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -147,5 +147,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 653346311,
|
||||
"name": "CVE-2023-27350",
|
||||
"full_name": "Jenderal92\/CVE-2023-27350",
|
||||
"owner": {
|
||||
"login": "Jenderal92",
|
||||
"id": 59664965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jenderal92"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/CVE-2023-27350",
|
||||
"description": "Python 2.7",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T22:13:24Z",
|
||||
"updated_at": "2023-06-13T22:17:45Z",
|
||||
"pushed_at": "2023-06-13T22:25:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "POC FortiOS SSL-VPN buffer overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T11:00:54Z",
|
||||
"updated_at": "2023-06-13T16:12:21Z",
|
||||
"updated_at": "2023-06-13T23:36:24Z",
|
||||
"pushed_at": "2023-06-13T10:26:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 653318513,
|
||||
"name": "CVE-2023-2986",
|
||||
"full_name": "Alucard0x1\/CVE-2023-2986",
|
||||
"owner": {
|
||||
"login": "Alucard0x1",
|
||||
"id": 3710918,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3710918?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alucard0x1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alucard0x1\/CVE-2023-2986",
|
||||
"description": "Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress in Python Version",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T20:35:03Z",
|
||||
"updated_at": "2023-06-13T20:40:39Z",
|
||||
"pushed_at": "2023-06-13T21:08:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T14:59:15Z",
|
||||
"updated_at": "2023-06-11T12:36:31Z",
|
||||
"updated_at": "2023-06-13T23:23:30Z",
|
||||
"pushed_at": "2023-06-10T15:12:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,18 +42,18 @@
|
|||
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T03:06:40Z",
|
||||
"updated_at": "2023-06-13T14:01:42Z",
|
||||
"updated_at": "2023-06-13T18:39:31Z",
|
||||
"pushed_at": "2023-05-16T04:34:16Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"forks": 60,
|
||||
"watchers": 243,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal).",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T02:17:25Z",
|
||||
"updated_at": "2023-06-09T17:21:54Z",
|
||||
"updated_at": "2023-06-13T20:27:10Z",
|
||||
"pushed_at": "2023-06-09T17:26:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "MOVEit CVE-2023-34362",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T19:07:32Z",
|
||||
"updated_at": "2023-06-13T17:04:35Z",
|
||||
"updated_at": "2023-06-14T00:32:53Z",
|
||||
"pushed_at": "2023-06-12T11:29:46Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 653138481,
|
||||
"name": "cve-2023-66975",
|
||||
"full_name": "Idoies\/cve-2023-66975",
|
||||
"owner": {
|
||||
"login": "Idoies",
|
||||
"id": 136469611,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136469611?v=4",
|
||||
"html_url": "https:\/\/github.com\/Idoies"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Idoies\/cve-2023-66975",
|
||||
"description": "远程脚本",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T13:28:02Z",
|
||||
"updated_at": "2023-06-13T13:28:52Z",
|
||||
"pushed_at": "2023-06-13T13:28:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
36
README.md
36
README.md
|
@ -345,6 +345,7 @@ The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to au
|
|||
</code>
|
||||
|
||||
- [Ayantaker/CVE-2023-2986](https://github.com/Ayantaker/CVE-2023-2986)
|
||||
- [Alucard0x1/CVE-2023-2986](https://github.com/Alucard0x1/CVE-2023-2986)
|
||||
|
||||
### CVE-2023-3009 (2023-05-31)
|
||||
|
||||
|
@ -478,6 +479,7 @@ Microsoft Word Remote Code Execution Vulnerability
|
|||
- [CKevens/CVE-2023-21716-POC](https://github.com/CKevens/CVE-2023-21716-POC)
|
||||
- [hv0l/CVE-2023-21716_exploit](https://github.com/hv0l/CVE-2023-21716_exploit)
|
||||
- [JMousqueton/CVE-2023-21716](https://github.com/JMousqueton/CVE-2023-21716)
|
||||
- [Lord-of-the-IoT/CVE-2023-21716](https://github.com/Lord-of-the-IoT/CVE-2023-21716)
|
||||
|
||||
### CVE-2023-21739 (2023-01-10)
|
||||
|
||||
|
@ -1038,6 +1040,7 @@ This vulnerability allows remote attackers to bypass authentication on affected
|
|||
- [horizon3ai/CVE-2023-27350](https://github.com/horizon3ai/CVE-2023-27350)
|
||||
- [adhikara13/CVE-2023-27350](https://github.com/adhikara13/CVE-2023-27350)
|
||||
- [Pari-Malam/CVE-2023-27350](https://github.com/Pari-Malam/CVE-2023-27350)
|
||||
- [Jenderal92/CVE-2023-27350](https://github.com/Jenderal92/CVE-2023-27350)
|
||||
|
||||
### CVE-2023-27524 (2023-04-24)
|
||||
|
||||
|
@ -1760,7 +1763,12 @@ D-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerabil
|
|||
|
||||
- [s0tr/CVE-2023-33782](https://github.com/s0tr/CVE-2023-33782)
|
||||
|
||||
### CVE-2023-33817
|
||||
### CVE-2023-33817 (2023-06-13)
|
||||
|
||||
<code>
|
||||
hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability.
|
||||
</code>
|
||||
|
||||
- [leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5](https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5)
|
||||
|
||||
### CVE-2023-33829 (2023-05-24)
|
||||
|
@ -1800,21 +1808,28 @@ In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.
|
|||
- [lithuanian-g/cve-2023-34362-iocs](https://github.com/lithuanian-g/cve-2023-34362-iocs)
|
||||
- [sfewer-r7/CVE-2023-34362](https://github.com/sfewer-r7/CVE-2023-34362)
|
||||
|
||||
### CVE-2023-34537
|
||||
### CVE-2023-34537 (2023-06-13)
|
||||
|
||||
<code>
|
||||
A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data.
|
||||
</code>
|
||||
|
||||
- [leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5](https://github.com/leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5)
|
||||
|
||||
### CVE-2023-34960
|
||||
- [Aituglo/CVE-2023-34960](https://github.com/Aituglo/CVE-2023-34960)
|
||||
|
||||
### CVE-2023-34965
|
||||
### CVE-2023-34965 (2023-06-13)
|
||||
|
||||
<code>
|
||||
SSPanel-Uim 2023.3 does not restrict access to the /link/ interface which can lead to a leak of user information.
|
||||
</code>
|
||||
|
||||
- [AgentY0/CVE-2023-34965](https://github.com/AgentY0/CVE-2023-34965)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
||||
### CVE-2023-66975
|
||||
- [Idoies/cve-2023-66975](https://github.com/Idoies/cve-2023-66975)
|
||||
|
||||
|
||||
## 2022
|
||||
### CVE-2022-0185 (2022-02-11)
|
||||
|
@ -11958,6 +11973,7 @@ Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP conne
|
|||
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
|
||||
</code>
|
||||
|
||||
- [bbinfosec43/CVE-2021-33909](https://github.com/bbinfosec43/CVE-2021-33909)
|
||||
- [ChrisTheCoolHut/CVE-2021-33909](https://github.com/ChrisTheCoolHut/CVE-2021-33909)
|
||||
|
||||
### CVE-2021-33959 (2023-01-18)
|
||||
|
@ -13918,14 +13934,6 @@ Automox Agent before 32 on Windows incorrectly sets permissions on a temporary d
|
|||
|
||||
- [gfoss/CVE-2021-43326_Exploit](https://github.com/gfoss/CVE-2021-43326_Exploit)
|
||||
|
||||
### CVE-2021-43361 (2022-09-28)
|
||||
|
||||
<code>
|
||||
Due to improper sanitization MedData HBYS software suffers from a remote SQL injection vulnerability. An unauthenticated attacker with the web access is able to extract critical information from the system.
|
||||
</code>
|
||||
|
||||
- [bartutku/CVE-2021-43361](https://github.com/bartutku/CVE-2021-43361)
|
||||
|
||||
### CVE-2021-43408 (2021-11-19)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue