Auto Update 2024/01/16 12:39:20

This commit is contained in:
motikan2010-bot 2024-01-16 21:39:20 +09:00
parent ff7679b0bd
commit c258c6ca81
68 changed files with 393 additions and 688 deletions

View file

@ -149,6 +149,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 319098047,
"name": "exploit-CVE-2007-2447",
"full_name": "xlcc4096\/exploit-CVE-2007-2447",
"owner": {
"login": "xlcc4096",
"id": 75581853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75581853?v=4",
"html_url": "https:\/\/github.com\/xlcc4096"
},
"html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447",
"description": "Exploit for the vulnerability CVE-2007-2447",
"fork": false,
"created_at": "2020-12-06T18:04:44Z",
"updated_at": "2020-12-06T18:09:38Z",
"pushed_at": "2020-12-06T18:09:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 319992014,
"name": "CVE-2007-2447_Samba_3.0.25rc3",

View file

@ -107,10 +107,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2024-01-08T07:20:35Z",
"updated_at": "2024-01-16T06:34:44Z",
"pushed_at": "2023-10-06T16:11:26Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -127,7 +127,7 @@
],
"visibility": "public",
"forks": 78,
"watchers": 235,
"watchers": 236,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "Gain privileges:system -> root,as a part of https:\/\/github.com\/retme7\/CVE-2014-7911_poc",
"fork": false,
"created_at": "2015-01-26T07:02:26Z",
"updated_at": "2023-08-01T13:09:11Z",
"updated_at": "2024-01-16T10:46:53Z",
"pushed_at": "2015-01-27T09:23:52Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 92,
"watchers": 93,
"score": 0,
"subscribers_count": 12
},
@ -43,10 +43,10 @@
"description": "CVE-2014-4322 Exploit",
"fork": false,
"created_at": "2015-08-16T00:02:45Z",
"updated_at": "2023-05-15T02:42:59Z",
"updated_at": "2024-01-16T10:46:51Z",
"pushed_at": "2016-01-24T16:19:47Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 8
},
@ -73,10 +73,10 @@
"description": "Just an attempt to adapt for Note 4, I do not know what I am doing.",
"fork": false,
"created_at": "2015-09-04T12:05:56Z",
"updated_at": "2015-09-16T03:31:13Z",
"updated_at": "2024-01-16T10:47:03Z",
"pushed_at": "2015-04-21T20:07:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -163,10 +163,10 @@
"description": "CVE-2014-7911 vulnerability and CVE-2014-4322 vulnerability to get root privilege",
"fork": false,
"created_at": "2016-03-23T03:21:11Z",
"updated_at": "2017-12-22T21:03:32Z",
"updated_at": "2024-01-16T10:47:02Z",
"pushed_at": "2016-03-23T08:32:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -263,10 +263,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2024-01-12T10:17:45Z",
"updated_at": "2024-01-16T09:26:46Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 301,
"watchers_count": 301,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -279,7 +279,7 @@
],
"visibility": "public",
"forks": 125,
"watchers": 300,
"watchers": 301,
"score": 0,
"subscribers_count": 16
},
@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-01-15T23:13:07Z",
"updated_at": "2024-01-16T09:19:16Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 791,
"watchers_count": 791,
"stargazers_count": 792,
"watchers_count": 792,
"has_discussions": false,
"forks_count": 438,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 438,
"watchers": 791,
"watchers": 792,
"score": 0,
"subscribers_count": 11
},

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2024-01-12T14:46:36Z",
"updated_at": "2024-01-16T11:44:38Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1158,
"watchers_count": 1158,
"stargazers_count": 1157,
"watchers_count": 1157,
"has_discussions": false,
"forks_count": 354,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 354,
"watchers": 1158,
"watchers": 1157,
"score": 0,
"subscribers_count": 69
},

View file

@ -43,10 +43,10 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2023-11-27T09:57:13Z",
"updated_at": "2024-01-16T11:44:18Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 301,
"watchers_count": 301,
"has_discussions": false,
"forks_count": 94,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 302,
"watchers": 301,
"score": 0,
"subscribers_count": 4
},

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
"fork": false,
"created_at": "2019-01-31T01:03:43Z",
"updated_at": "2023-12-08T17:49:16Z",
"updated_at": "2024-01-16T10:23:35Z",
"pushed_at": "2019-01-31T00:53:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Apisix系列漏洞未授权漏洞CVE-2021-45232、默认秘钥CVE-2020-13945批量探测。",
"fork": false,
"created_at": "2022-05-09T12:26:11Z",
"updated_at": "2023-12-01T08:07:24Z",
"updated_at": "2024-01-16T08:55:32Z",
"pushed_at": "2022-05-09T12:32:43Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-01-14T14:51:08Z",
"updated_at": "2024-01-16T08:25:16Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1667,
"watchers_count": 1667,
"stargazers_count": 1668,
"watchers_count": 1668,
"has_discussions": false,
"forks_count": 368,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 368,
"watchers": 1667,
"watchers": 1668,
"score": 0,
"subscribers_count": 88
},

View file

@ -13,10 +13,10 @@
"description": "Typesetter CMS文件上传漏洞环境",
"fork": false,
"created_at": "2020-10-09T06:50:02Z",
"updated_at": "2023-09-22T08:27:50Z",
"updated_at": "2024-01-16T10:19:52Z",
"pushed_at": "2022-12-08T06:04:10Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -108,10 +108,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2024-01-13T02:54:38Z",
"updated_at": "2024-01-16T07:33:42Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 531,
"watchers_count": 531,
"stargazers_count": 532,
"watchers_count": 532,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 531,
"watchers": 532,
"score": 0,
"subscribers_count": 9
},

View file

@ -179,36 +179,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 412724557,
"name": "CVE-2021-22005-metasploit",
"full_name": "TaroballzChen\/CVE-2021-22005-metasploit",
"owner": {
"login": "TaroballzChen",
"id": 27862593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
"html_url": "https:\/\/github.com\/TaroballzChen"
},
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-22005-metasploit",
"description": "the metasploit script(POC\/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability",
"fork": false,
"created_at": "2021-10-02T07:32:04Z",
"updated_at": "2023-12-08T12:43:34Z",
"pushed_at": "2021-10-02T08:21:38Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},
{
"id": 420817779,
"name": "CVE-2021-22005",

View file

@ -473,10 +473,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
"updated_at": "2024-01-13T02:52:05Z",
"updated_at": "2024-01-16T09:00:34Z",
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -492,7 +492,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 195,
"watchers": 196,
"score": 0,
"subscribers_count": 2
},

View file

@ -89,36 +89,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 412296277,
"name": "CVE-2021-22555-esc-priv",
"full_name": "daletoniris\/CVE-2021-22555-esc-priv",
"owner": {
"login": "daletoniris",
"id": 4347515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4347515?v=4",
"html_url": "https:\/\/github.com\/daletoniris"
},
"html_url": "https:\/\/github.com\/daletoniris\/CVE-2021-22555-esc-priv",
"description": null,
"fork": false,
"created_at": "2021-10-01T02:18:45Z",
"updated_at": "2021-10-01T02:19:18Z",
"pushed_at": "2021-10-01T02:19:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 478003975,
"name": "CVE-2021-22555-PipeVersion",

View file

@ -1,34 +1,4 @@
[
{
"id": 413699979,
"name": "CVE-2021-24545",
"full_name": "V35HR4J\/CVE-2021-24545",
"owner": {
"login": "V35HR4J",
"id": 54109630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
"html_url": "https:\/\/github.com\/V35HR4J"
},
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24545",
"description": "The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post\/s.",
"fork": false,
"created_at": "2021-10-05T06:28:05Z",
"updated_at": "2021-10-12T14:24:58Z",
"pushed_at": "2021-10-05T06:29:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 424104785,
"name": "CVE-2021-24545",

View file

@ -1,32 +0,0 @@
[
{
"id": 413698388,
"name": "CVE-2021-24563",
"full_name": "V35HR4J\/CVE-2021-24563",
"owner": {
"login": "V35HR4J",
"id": 54109630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
"html_url": "https:\/\/github.com\/V35HR4J"
},
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24563",
"description": "The plugin does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly",
"fork": false,
"created_at": "2021-10-05T06:21:50Z",
"updated_at": "2022-03-25T03:22:55Z",
"pushed_at": "2021-10-05T06:30:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -843,36 +843,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 412676582,
"name": "CVE-2021-26084",
"full_name": "wdjcy\/CVE-2021-26084",
"owner": {
"login": "wdjcy",
"id": 6531850,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531850?v=4",
"html_url": "https:\/\/github.com\/wdjcy"
},
"html_url": "https:\/\/github.com\/wdjcy\/CVE-2021-26084",
"description": null,
"fork": false,
"created_at": "2021-10-02T03:11:50Z",
"updated_at": "2021-10-02T03:16:43Z",
"pushed_at": "2021-10-02T03:16:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414400971,
"name": "CVE-2021-26084",
@ -903,36 +873,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 419246152,
"name": "CVE-2021-26084_Confluence",
"full_name": "TheclaMcentire\/CVE-2021-26084_Confluence",
"owner": {
"login": "TheclaMcentire",
"id": 86812068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86812068?v=4",
"html_url": "https:\/\/github.com\/TheclaMcentire"
},
"html_url": "https:\/\/github.com\/TheclaMcentire\/CVE-2021-26084_Confluence",
"description": "Exploit CVE 2021 26084 Confluence",
"fork": false,
"created_at": "2021-10-20T08:27:58Z",
"updated_at": "2022-03-09T21:42:31Z",
"pushed_at": "2021-09-08T11:04:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 420861154,
"name": "CVE-2021-26084",
@ -1023,36 +963,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 439271937,
"name": "Confluence-CVE-2021-26084",
"full_name": "30579096\/Confluence-CVE-2021-26084",
"owner": {
"login": "30579096",
"id": 27181766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27181766?v=4",
"html_url": "https:\/\/github.com\/30579096"
},
"html_url": "https:\/\/github.com\/30579096\/Confluence-CVE-2021-26084",
"description": "OGNL Injection in Confluence server version < 7.12.5",
"fork": false,
"created_at": "2021-12-17T09:04:55Z",
"updated_at": "2022-01-19T15:47:35Z",
"pushed_at": "2021-09-03T07:37:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 447489190,
"name": "CVE-2021-26084",

View file

@ -1,34 +1,4 @@
[
{
"id": 413725319,
"name": "nacos-cve-2021-29441",
"full_name": "hh-hunter\/nacos-cve-2021-29441",
"owner": {
"login": "hh-hunter",
"id": 91593280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
"html_url": "https:\/\/github.com\/hh-hunter"
},
"html_url": "https:\/\/github.com\/hh-hunter\/nacos-cve-2021-29441",
"description": null,
"fork": false,
"created_at": "2021-10-05T07:59:05Z",
"updated_at": "2021-10-05T07:59:17Z",
"pushed_at": "2021-10-05T07:59:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 470076597,
"name": "CVE-2021-29441",

View file

@ -13,10 +13,10 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2024-01-10T09:48:38Z",
"updated_at": "2024-01-16T10:19:53Z",
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 385,
"watchers_count": 385,
"stargazers_count": 384,
"watchers_count": 384,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 134,
"watchers": 385,
"watchers": 384,
"score": 0,
"subscribers_count": 4
},
@ -185,36 +185,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 412824012,
"name": "CVE-2021-3493",
"full_name": "puckiestyle\/CVE-2021-3493",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-3493",
"description": null,
"fork": false,
"created_at": "2021-10-02T14:44:43Z",
"updated_at": "2023-01-10T03:23:13Z",
"pushed_at": "2021-10-02T14:44:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 544564976,
"name": "CVE-2021-3493",

View file

@ -1,32 +0,0 @@
[
{
"id": 413549812,
"name": "CVE-2021-39433",
"full_name": "PinkDraconian\/CVE-2021-39433",
"owner": {
"login": "PinkDraconian",
"id": 44903767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44903767?v=4",
"html_url": "https:\/\/github.com\/PinkDraconian"
},
"html_url": "https:\/\/github.com\/PinkDraconian\/CVE-2021-39433",
"description": "BIQS IT Biqs-drive v1.83",
"fork": false,
"created_at": "2021-10-04T19:02:35Z",
"updated_at": "2022-12-10T12:13:04Z",
"pushed_at": "2021-10-04T19:02:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-01-15T23:13:33Z",
"updated_at": "2024-01-16T06:57:02Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 934,
"watchers_count": 934,
"has_discussions": false,
"forks_count": 182,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 182,
"watchers": 933,
"watchers": 934,
"score": 0,
"subscribers_count": 14
},
@ -4812,5 +4812,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 743945734,
"name": "CVE-2021-4034",
"full_name": "Pol-Ruiz\/CVE-2021-4034",
"owner": {
"login": "Pol-Ruiz",
"id": 151052652,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151052652?v=4",
"html_url": "https:\/\/github.com\/Pol-Ruiz"
},
"html_url": "https:\/\/github.com\/Pol-Ruiz\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2024-01-16T10:18:38Z",
"updated_at": "2024-01-16T10:19:27Z",
"pushed_at": "2024-01-16T10:19:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -675,36 +675,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 417517068,
"name": "MSHTML-CVE-2021-40444",
"full_name": "metehangenel\/MSHTML-CVE-2021-40444",
"owner": {
"login": "metehangenel",
"id": 31937891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31937891?v=4",
"html_url": "https:\/\/github.com\/metehangenel"
},
"html_url": "https:\/\/github.com\/metehangenel\/MSHTML-CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-15T13:52:34Z",
"updated_at": "2022-12-16T15:56:59Z",
"pushed_at": "2021-09-16T17:53:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 417810289,
"name": "TIC4301_Project",

View file

@ -197,10 +197,10 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2024-01-12T13:11:26Z",
"updated_at": "2024-01-16T09:07:19Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -209,7 +209,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 4
},

View file

@ -1,32 +0,0 @@
[
{
"id": 412766915,
"name": "CVE-2021-41511",
"full_name": "vidvansh\/CVE-2021-41511",
"owner": {
"login": "vidvansh",
"id": 56179464,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56179464?v=4",
"html_url": "https:\/\/github.com\/vidvansh"
},
"html_url": "https:\/\/github.com\/vidvansh\/CVE-2021-41511",
"description": null,
"fork": false,
"created_at": "2021-10-02T10:44:59Z",
"updated_at": "2021-10-02T10:46:57Z",
"pushed_at": "2021-10-02T10:46:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413892415,
"name": "CVE-2021-41773",
"full_name": "numanturle\/CVE-2021-41773",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-05T16:18:09Z",
"updated_at": "2023-12-08T12:43:35Z",
"pushed_at": "2021-10-05T16:48:27Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},
{
"id": 413901787,
"name": "CVE-2021-41773",
@ -215,36 +185,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 413972926,
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
"description": "Poc.py ",
"fork": false,
"created_at": "2021-10-05T20:41:34Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 414013246,
"name": "CVE-2021-41773-PoC",

View file

@ -18,7 +18,7 @@
"stargazers_count": 949,
"watchers_count": 949,
"has_discussions": false,
"forks_count": 191,
"forks_count": 192,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"s4u2self"
],
"visibility": "public",
"forks": 191,
"forks": 192,
"watchers": 949,
"score": 0,
"subscribers_count": 26

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-01-14T10:17:26Z",
"updated_at": "2024-01-16T09:21:11Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1275,
"watchers_count": 1275,
"stargazers_count": 1276,
"watchers_count": 1276,
"has_discussions": false,
"forks_count": 317,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 317,
"watchers": 1275,
"watchers": 1276,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "Windows Common Log File System Driver POC",
"fork": false,
"created_at": "2021-12-21T01:51:41Z",
"updated_at": "2024-01-04T17:04:21Z",
"updated_at": "2024-01-16T10:46:56Z",
"pushed_at": "2021-12-21T06:57:06Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "a Proof of Concept of cve-2021-43226,stack overflow in Windows driver clfs.sys",
"fork": false,
"created_at": "2023-10-30T06:47:50Z",
"updated_at": "2023-10-30T06:51:42Z",
"updated_at": "2024-01-16T10:47:51Z",
"pushed_at": "2023-10-30T07:34:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -1393,10 +1393,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-01-15T16:00:21Z",
"updated_at": "2024-01-16T08:51:57Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 854,
"watchers_count": 854,
"stargazers_count": 853,
"watchers_count": 853,
"has_discussions": false,
"forks_count": 177,
"allow_forking": true,
@ -1418,7 +1418,7 @@
],
"visibility": "public",
"forks": 177,
"watchers": 854,
"watchers": 853,
"score": 0,
"subscribers_count": 33
},
@ -1497,7 +1497,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2023-05-28T11:06:10Z",
"pushed_at": "2023-12-21T17:39:07Z",
"pushed_at": "2024-01-16T11:53:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -9203,10 +9203,10 @@
"description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
"fork": false,
"created_at": "2021-12-21T03:01:36Z",
"updated_at": "2022-06-01T10:22:55Z",
"updated_at": "2024-01-16T08:51:53Z",
"pushed_at": "2022-01-24T16:43:41Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -9215,7 +9215,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 33,
"watchers": 32,
"score": 0,
"subscribers_count": 16
},

View file

@ -376,10 +376,10 @@
"description": "Apisix系列漏洞未授权漏洞CVE-2021-45232、默认秘钥CVE-2020-13945批量探测。",
"fork": false,
"created_at": "2022-05-09T12:26:11Z",
"updated_at": "2023-12-01T08:07:24Z",
"updated_at": "2024-01-16T08:55:32Z",
"pushed_at": "2022-05-09T12:32:43Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -388,7 +388,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -103,10 +103,10 @@
"description": "CVE-2022-0185 POC and Docker and Analysis write up",
"fork": false,
"created_at": "2022-02-18T09:27:34Z",
"updated_at": "2023-10-25T08:00:52Z",
"updated_at": "2024-01-16T10:19:57Z",
"pushed_at": "2022-05-24T11:18:03Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 37,
"watchers": 36,
"score": 0,
"subscribers_count": 3
},

View file

@ -1871,10 +1871,10 @@
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
"fork": false,
"created_at": "2022-06-04T08:31:32Z",
"updated_at": "2024-01-12T13:11:31Z",
"updated_at": "2024-01-16T08:41:18Z",
"pushed_at": "2022-06-16T17:14:10Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1891,7 +1891,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Security issue in the hypervisor firmware of some older Qualcomm chipsets",
"fork": false,
"created_at": "2022-12-27T19:48:30Z",
"updated_at": "2024-01-15T09:26:55Z",
"updated_at": "2024-01-16T07:09:33Z",
"pushed_at": "2022-12-27T20:32:37Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": true,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-02-09T18:28:00Z",
"updated_at": "2023-09-06T10:47:51Z",
"updated_at": "2024-01-16T09:35:12Z",
"pushed_at": "2022-05-09T17:26:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2024-01-11T07:41:30Z",
"updated_at": "2024-01-16T07:13:55Z",
"pushed_at": "2023-03-04T05:52:28Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 459,
"watchers": 460,
"score": 0,
"subscribers_count": 50
},

View file

@ -257,10 +257,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2024-01-12T13:55:22Z",
"updated_at": "2024-01-16T08:03:01Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 376,
"watchers_count": 376,
"stargazers_count": 377,
"watchers_count": 377,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -269,7 +269,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 376,
"watchers": 377,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "PoC for Arbitrary Code Execution in Notable",
"fork": false,
"created_at": "2022-07-16T15:55:28Z",
"updated_at": "2024-01-12T02:15:43Z",
"updated_at": "2024-01-16T06:54:53Z",
"pushed_at": "2023-03-13T03:30:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-11-01T03:41:36Z",
"updated_at": "2023-09-30T19:44:45Z",
"updated_at": "2024-01-16T10:20:00Z",
"pushed_at": "2022-11-01T05:25:52Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 28,
"score": 0,
"subscribers_count": 2
}

View file

@ -202,13 +202,13 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 23,
"score": 0,
"subscribers_count": 1

View file

@ -103,10 +103,10 @@
"description": "CVE analysis for CVE-2023-0669",
"fork": false,
"created_at": "2023-02-26T02:33:54Z",
"updated_at": "2024-01-12T02:15:38Z",
"updated_at": "2024-01-16T06:54:31Z",
"pushed_at": "2023-03-12T17:37:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,5 +28,35 @@
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
{
"id": 743946606,
"name": "CVE-2023-1326",
"full_name": "Pol-Ruiz\/CVE-2023-1326",
"owner": {
"login": "Pol-Ruiz",
"id": 151052652,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151052652?v=4",
"html_url": "https:\/\/github.com\/Pol-Ruiz"
},
"html_url": "https:\/\/github.com\/Pol-Ruiz\/CVE-2023-1326",
"description": "Esto es una prueba de concepto propia i basica de la vulneravilidad CVE-2023-1326",
"fork": false,
"created_at": "2024-01-16T10:20:53Z",
"updated_at": "2024-01-16T10:20:53Z",
"pushed_at": "2024-01-16T10:21:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T00:31:50Z",
"updated_at": "2024-01-02T10:32:29Z",
"updated_at": "2024-01-16T08:52:16Z",
"pushed_at": "2023-08-21T00:33:08Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
"updated_at": "2023-12-17T23:21:02Z",
"updated_at": "2024-01-16T11:02:07Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 106,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 106,
"watchers": 9,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2024-01-13T09:47:31Z",
"updated_at": "2024-01-16T06:45:58Z",
"pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 3
},

32
2023/CVE-2023-22527.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 743909012,
"name": "CVE-2023-22527_Confluence_RCE",
"full_name": "Avento\/CVE-2023-22527_Confluence_RCE",
"owner": {
"login": "Avento",
"id": 13798539,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13798539?v=4",
"html_url": "https:\/\/github.com\/Avento"
},
"html_url": "https:\/\/github.com\/Avento\/CVE-2023-22527_Confluence_RCE",
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
"fork": false,
"created_at": "2024-01-16T08:46:21Z",
"updated_at": "2024-01-16T08:46:22Z",
"pushed_at": "2024-01-16T09:54:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-01-05T08:40:07Z",
"updated_at": "2024-01-16T10:20:02Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 235,
"watchers": 234,
"score": 0,
"subscribers_count": 4
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 21,
"score": 0,
"subscribers_count": 1
@ -78,13 +78,13 @@
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 110,
"score": 0,
"subscribers_count": 3
@ -228,13 +228,13 @@
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 50,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2024-01-10T18:16:32Z",
"updated_at": "2024-01-16T08:53:08Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 107,
"watchers": 108,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34312",
"fork": false,
"created_at": "2023-05-27T12:44:42Z",
"updated_at": "2024-01-12T13:09:37Z",
"updated_at": "2024-01-16T10:20:02Z",
"pushed_at": "2023-05-27T12:45:10Z",
"stargazers_count": 418,
"watchers_count": 418,
"stargazers_count": 417,
"watchers_count": 417,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 78,
"watchers": 418,
"watchers": 417,
"score": 0,
"subscribers_count": 3
},

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/actuator"
},
"html_url": "https:\/\/github.com\/actuator\/7-Eleven-Bluetooth-Smart-Cup-Jailbreak",
"description": "'Hacking' a 7-Eleven Bluetooth Smart Cup | CVE-2023-34761",
"description": "'Hacking' a 7-Eleven Bluetooth Smart Cup 😅 | CVE-2023-34761",
"fork": false,
"created_at": "2023-05-04T18:37:39Z",
"updated_at": "2024-01-01T20:18:00Z",
"updated_at": "2024-01-16T08:05:04Z",
"pushed_at": "2023-06-23T00:10:55Z",
"stargazers_count": 19,
"watchers_count": 19,

View file

@ -13,10 +13,10 @@
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
"fork": false,
"created_at": "2024-01-11T19:17:13Z",
"updated_at": "2024-01-16T04:18:58Z",
"updated_at": "2024-01-16T12:15:49Z",
"pushed_at": "2024-01-11T19:42:03Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 70,
"watchers": 72,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "Windows SmartScreen Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2023-12-28T23:29:04Z",
"updated_at": "2024-01-10T00:34:18Z",
"updated_at": "2024-01-16T11:37:41Z",
"pushed_at": "2023-12-29T22:11:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-37903 ",
"fork": false,
"created_at": "2023-11-05T11:23:15Z",
"updated_at": "2024-01-15T05:16:06Z",
"updated_at": "2024-01-16T10:20:04Z",
"pushed_at": "2023-11-05T12:19:32Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,7 +13,7 @@
"description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
"fork": false,
"created_at": "2023-10-06T01:40:34Z",
"updated_at": "2024-01-16T04:46:15Z",
"updated_at": "2024-01-16T08:25:58Z",
"pushed_at": "2023-10-07T03:26:00Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)",
"fork": false,
"created_at": "2024-01-15T07:58:28Z",
"updated_at": "2024-01-15T09:36:28Z",
"updated_at": "2024-01-16T08:59:45Z",
"pushed_at": "2024-01-15T15:16:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2024-01-13T23:27:32Z",
"updated_at": "2024-01-16T10:20:04Z",
"pushed_at": "2023-12-07T03:10:06Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 160,
"watchers": 159,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.",
"fork": false,
"created_at": "2024-01-14T18:30:11Z",
"updated_at": "2024-01-16T04:34:03Z",
"updated_at": "2024-01-16T08:08:56Z",
"pushed_at": "2024-01-16T05:48:06Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -29,8 +29,38 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 743894339,
"name": "CVE-2023-46805",
"full_name": "cbeek-r7\/CVE-2023-46805",
"owner": {
"login": "cbeek-r7",
"id": 117099647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117099647?v=4",
"html_url": "https:\/\/github.com\/cbeek-r7"
},
"html_url": "https:\/\/github.com\/cbeek-r7\/CVE-2023-46805",
"description": "Simple scanner for scanning a list of ip-addresses for vulnerable Ivanti Pulse Secure devices",
"fork": false,
"created_at": "2024-01-16T08:05:58Z",
"updated_at": "2024-01-16T10:57:23Z",
"pushed_at": "2024-01-16T08:27:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -284,7 +284,7 @@
"fork": false,
"created_at": "2024-01-12T09:34:57Z",
"updated_at": "2024-01-13T09:36:42Z",
"pushed_at": "2024-01-15T07:40:03Z",
"pushed_at": "2024-01-16T10:06:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-13T10:11:18Z",
"updated_at": "2024-01-14T17:12:41Z",
"updated_at": "2024-01-16T10:51:59Z",
"pushed_at": "2024-01-13T10:30:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -124,10 +124,10 @@
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
"fork": false,
"created_at": "2024-01-02T14:20:10Z",
"updated_at": "2024-01-16T06:01:04Z",
"updated_at": "2024-01-16T10:30:40Z",
"pushed_at": "2024-01-02T15:43:26Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},
@ -184,10 +184,10 @@
"description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
"fork": false,
"created_at": "2024-01-06T04:07:07Z",
"updated_at": "2024-01-15T08:35:17Z",
"updated_at": "2024-01-16T07:35:34Z",
"pushed_at": "2024-01-06T10:33:34Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -196,7 +196,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6875 PoC",
"fork": false,
"created_at": "2024-01-13T15:23:17Z",
"updated_at": "2024-01-16T03:00:44Z",
"updated_at": "2024-01-16T11:22:51Z",
"pushed_at": "2024-01-15T10:58:20Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 14,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -106,19 +106,19 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-01-16T03:07:32Z",
"updated_at": "2024-01-16T12:06:20Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 146,
"forks": 25,
"watchers": 148,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-01-16T06:03:26Z",
"updated_at": "2024-01-16T10:59:47Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 76,
"forks": 11,
"watchers": 79,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.",
"fork": false,
"created_at": "2024-01-14T18:30:11Z",
"updated_at": "2024-01-16T04:34:03Z",
"updated_at": "2024-01-16T08:08:56Z",
"pushed_at": "2024-01-16T05:48:06Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -214,6 +214,7 @@
</code>
- [diego-tella/CVE-2023-1326-PoC](https://github.com/diego-tella/CVE-2023-1326-PoC)
- [Pol-Ruiz/CVE-2023-1326](https://github.com/Pol-Ruiz/CVE-2023-1326)
### CVE-2023-1337 (2023-03-10)
@ -1669,6 +1670,13 @@
- [imperva/CVE-2023-22524](https://github.com/imperva/CVE-2023-22524)
- [ron-imperva/CVE-2023-22524](https://github.com/ron-imperva/CVE-2023-22524)
### CVE-2023-22527 (-)
<code>Summary of Vulnerability\nA template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassians January Security Bulletin.\n\nSee “What You Need to Do” for detailed instructions.\n\n{panel:bgColor=#deebff}\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\n{panel}\n\nAffected Versions\n\n||Product||Affected Versions||\n|Confluence Data Center and Server|8.0.x\n8.1.x\n8.2.x\n8.3.x\n8.4.x\n8.5.0\n8.5.1\n8.5.2\n8.5.3|\n\nFixed Versions\n\n||Product||Fixed Versions||\n|Confluence Data Center and Server|8.5.4 (LTS)|\n|Confluence Data Center|8.6.0 or later (Data Center Only)\n8.7.1 or later (Data Center Only)|\n\nWhat You Need To Do\nImmediately patch to a fixed version\n\nAtlassian recommends that you patch each of your affected installations to the latest version. The listed Fixed Versions are no longer the most up-to-date versions and do not protect your instance from other non-critical vulnerabilities as outlined in Atlassians January Security Bulletin.\n\n||Product||Fixed Versions||Latest Versions||\n|Confluence Data Center and Server|8.5.4 (LTS)|8.5.5 (LTS)|\n|Confluence Data Center|8.6.0 or later (Data Center Only)\n8.7.1 or later (Data Center Only)|8.7.2 or later (Data Center Only)|\n\nFor additional details, please see full advisory.
</code>
- [Avento/CVE-2023-22527_Confluence_RCE](https://github.com/Avento/CVE-2023-22527_Confluence_RCE)
### CVE-2023-22551 (2023-01-01)
<code>The FTP (aka &quot;Implementation of a simple FTP client and server&quot;) project through 96c1a35 allows remote attackers to cause a denial of service (memory consumption) by engaging in client activity, such as establishing and then terminating a connection. This occurs because malloc is used but free is not.
@ -5803,6 +5811,7 @@
</code>
- [yoryio/CVE-2023-46805_CVE-2024-21887_Scanner](https://github.com/yoryio/CVE-2023-46805_CVE-2024-21887_Scanner)
- [cbeek-r7/CVE-2023-46805](https://github.com/cbeek-r7/CVE-2023-46805)
### CVE-2023-46813 (2023-10-26)
@ -13775,7 +13784,6 @@
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
- [derek-turing/CVE-2021-3493](https://github.com/derek-turing/CVE-2021-3493)
- [cerodah/overlayFS-CVE-2021-3493](https://github.com/cerodah/overlayFS-CVE-2021-3493)
- [puckiestyle/CVE-2021-3493](https://github.com/puckiestyle/CVE-2021-3493)
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
- [fei9747/CVE-2021-3493](https://github.com/fei9747/CVE-2021-3493)
- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
@ -14053,6 +14061,7 @@
- [cdxiaodong/CVE-2021-4034-touch](https://github.com/cdxiaodong/CVE-2021-4034-touch)
- [LucasPDiniz/CVE-2021-4034](https://github.com/LucasPDiniz/CVE-2021-4034)
- [lluriam19/CVE-2021-4034-Vuln](https://github.com/lluriam19/CVE-2021-4034-Vuln)
- [Pol-Ruiz/CVE-2021-4034](https://github.com/Pol-Ruiz/CVE-2021-4034)
### CVE-2021-4043 (2022-02-04)
@ -14493,7 +14502,6 @@
- [5gstudent/CVE-2021-22005-](https://github.com/5gstudent/CVE-2021-22005-)
- [RedTeamExp/CVE-2021-22005_PoC](https://github.com/RedTeamExp/CVE-2021-22005_PoC)
- [rwincey/CVE-2021-22005](https://github.com/rwincey/CVE-2021-22005)
- [TaroballzChen/CVE-2021-22005-metasploit](https://github.com/TaroballzChen/CVE-2021-22005-metasploit)
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
@ -14648,7 +14656,6 @@
- [JoneyJunior/cve-2021-22555](https://github.com/JoneyJunior/cve-2021-22555)
- [xyjl-ly/CVE-2021-22555-Exploit](https://github.com/xyjl-ly/CVE-2021-22555-Exploit)
- [cgwalters/container-cve-2021-22555](https://github.com/cgwalters/container-cve-2021-22555)
- [daletoniris/CVE-2021-22555-esc-priv](https://github.com/daletoniris/CVE-2021-22555-esc-priv)
- [veritas501/CVE-2021-22555-PipeVersion](https://github.com/veritas501/CVE-2021-22555-PipeVersion)
- [masjohncook/netsec-project](https://github.com/masjohncook/netsec-project)
- [tukru/CVE-2021-22555](https://github.com/tukru/CVE-2021-22555)
@ -14896,16 +14903,8 @@
<code>The WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.
</code>
- [V35HR4J/CVE-2021-24545](https://github.com/V35HR4J/CVE-2021-24545)
- [dnr6419/CVE-2021-24545](https://github.com/dnr6419/CVE-2021-24545)
### CVE-2021-24563 (2021-10-11)
<code>The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
</code>
- [V35HR4J/CVE-2021-24563](https://github.com/V35HR4J/CVE-2021-24563)
### CVE-2021-24647 (2021-11-08)
<code>The Registration Forms User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.1.7.6 has a flaw in the social login implementation, allowing unauthenticated attacker to login as any user on the site by only knowing their user ID or username
@ -15125,13 +15124,10 @@
- [nizar0x1f/CVE-2021-26084-patch-](https://github.com/nizar0x1f/CVE-2021-26084-patch-)
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
- [orangmuda/CVE-2021-26084](https://github.com/orangmuda/CVE-2021-26084)
- [TheclaMcentire/CVE-2021-26084_Confluence](https://github.com/TheclaMcentire/CVE-2021-26084_Confluence)
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
@ -15686,7 +15682,6 @@
<code>Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
</code>
- [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441)
- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
### CVE-2021-29447 (2021-04-15)
@ -17048,13 +17043,6 @@
- [StefanDorresteijn/CVE-2021-39409](https://github.com/StefanDorresteijn/CVE-2021-39409)
### CVE-2021-39433 (2021-10-04)
<code>A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.
</code>
- [PinkDraconian/CVE-2021-39433](https://github.com/PinkDraconian/CVE-2021-39433)
### CVE-2021-39473 (2022-11-04)
<code>Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.
@ -17270,7 +17258,6 @@
- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
- [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021)
- [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444)
- [metehangenel/MSHTML-CVE-2021-40444](https://github.com/metehangenel/MSHTML-CVE-2021-40444)
- [Jeromeyoung/TIC4301_Project](https://github.com/Jeromeyoung/TIC4301_Project)
- [tiagob0b/CVE-2021-40444](https://github.com/tiagob0b/CVE-2021-40444)
- [wh00datz/CVE-2021-40444-POC](https://github.com/wh00datz/CVE-2021-40444-POC)
@ -17518,13 +17505,6 @@
- [Net-hunter121/CVE-2021-41381](https://github.com/Net-hunter121/CVE-2021-41381)
### CVE-2021-41511 (2021-10-04)
<code>The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
</code>
- [vidvansh/CVE-2021-41511](https://github.com/vidvansh/CVE-2021-41511)
### CVE-2021-41560 (2021-12-15)
<code>OpenCATS through 0.9.6 allows remote attackers to execute arbitrary code by uploading an executable file via lib/FileUtility.php.
@ -17618,13 +17598,11 @@
</code>
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
@ -38444,6 +38422,7 @@
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
- [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447)
- [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3)
- [Ziemni/CVE-2007-2447-in-Python](https://github.com/Ziemni/CVE-2007-2447-in-Python)
- [0xKn/CVE-2007-2447](https://github.com/0xKn/CVE-2007-2447)