mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/01/16 12:39:20
This commit is contained in:
parent
ff7679b0bd
commit
c258c6ca81
68 changed files with 393 additions and 688 deletions
|
@ -149,6 +149,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 319098047,
|
||||
"name": "exploit-CVE-2007-2447",
|
||||
"full_name": "xlcc4096\/exploit-CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "xlcc4096",
|
||||
"id": 75581853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75581853?v=4",
|
||||
"html_url": "https:\/\/github.com\/xlcc4096"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447",
|
||||
"description": "Exploit for the vulnerability CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-06T18:04:44Z",
|
||||
"updated_at": "2020-12-06T18:09:38Z",
|
||||
"pushed_at": "2020-12-06T18:09:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 319992014,
|
||||
"name": "CVE-2007-2447_Samba_3.0.25rc3",
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-03T20:28:27Z",
|
||||
"updated_at": "2024-01-08T07:20:35Z",
|
||||
"updated_at": "2024-01-16T06:34:44Z",
|
||||
"pushed_at": "2023-10-06T16:11:26Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -127,7 +127,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 235,
|
||||
"watchers": 236,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Gain privileges:system -> root,as a part of https:\/\/github.com\/retme7\/CVE-2014-7911_poc",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-26T07:02:26Z",
|
||||
"updated_at": "2023-08-01T13:09:11Z",
|
||||
"updated_at": "2024-01-16T10:46:53Z",
|
||||
"pushed_at": "2015-01-27T09:23:52Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2014-4322 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2015-08-16T00:02:45Z",
|
||||
"updated_at": "2023-05-15T02:42:59Z",
|
||||
"updated_at": "2024-01-16T10:46:51Z",
|
||||
"pushed_at": "2016-01-24T16:19:47Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "Just an attempt to adapt for Note 4, I do not know what I am doing.",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-04T12:05:56Z",
|
||||
"updated_at": "2015-09-16T03:31:13Z",
|
||||
"updated_at": "2024-01-16T10:47:03Z",
|
||||
"pushed_at": "2015-04-21T20:07:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "CVE-2014-7911 vulnerability and CVE-2014-4322 vulnerability to get root privilege!",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-23T03:21:11Z",
|
||||
"updated_at": "2017-12-22T21:03:32Z",
|
||||
"updated_at": "2024-01-16T10:47:02Z",
|
||||
"pushed_at": "2016-03-23T08:32:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -263,10 +263,10 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2024-01-12T10:17:45Z",
|
||||
"updated_at": "2024-01-16T09:26:46Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"has_discussions": false,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
|
@ -279,7 +279,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 300,
|
||||
"watchers": 301,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2024-01-15T23:13:07Z",
|
||||
"updated_at": "2024-01-16T09:19:16Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 791,
|
||||
"watchers_count": 791,
|
||||
"stargazers_count": 792,
|
||||
"watchers_count": 792,
|
||||
"has_discussions": false,
|
||||
"forks_count": 438,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 438,
|
||||
"watchers": 791,
|
||||
"watchers": 792,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -1841,10 +1841,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2024-01-12T14:46:36Z",
|
||||
"updated_at": "2024-01-16T11:44:38Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1158,
|
||||
"watchers_count": 1158,
|
||||
"stargazers_count": 1157,
|
||||
"watchers_count": 1157,
|
||||
"has_discussions": false,
|
||||
"forks_count": 354,
|
||||
"allow_forking": true,
|
||||
|
@ -1853,7 +1853,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 354,
|
||||
"watchers": 1158,
|
||||
"watchers": 1157,
|
||||
"score": 0,
|
||||
"subscribers_count": 69
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T05:59:24Z",
|
||||
"updated_at": "2023-11-27T09:57:13Z",
|
||||
"updated_at": "2024-01-16T11:44:18Z",
|
||||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"has_discussions": false,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 302,
|
||||
"watchers": 301,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -13,10 +13,10 @@
|
|||
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-31T01:03:43Z",
|
||||
"updated_at": "2023-12-08T17:49:16Z",
|
||||
"updated_at": "2024-01-16T10:23:35Z",
|
||||
"pushed_at": "2019-01-31T00:53:03Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apisix系列漏洞:未授权漏洞(CVE-2021-45232)、默认秘钥(CVE-2020-13945)批量探测。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T12:26:11Z",
|
||||
"updated_at": "2023-12-01T08:07:24Z",
|
||||
"updated_at": "2024-01-16T08:55:32Z",
|
||||
"pushed_at": "2022-05-09T12:32:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-01-14T14:51:08Z",
|
||||
"updated_at": "2024-01-16T08:25:16Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1667,
|
||||
"watchers_count": 1667,
|
||||
"stargazers_count": 1668,
|
||||
"watchers_count": 1668,
|
||||
"has_discussions": false,
|
||||
"forks_count": 368,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 368,
|
||||
"watchers": 1667,
|
||||
"watchers": 1668,
|
||||
"score": 0,
|
||||
"subscribers_count": 88
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Typesetter CMS文件上传漏洞环境",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:50:02Z",
|
||||
"updated_at": "2023-09-22T08:27:50Z",
|
||||
"updated_at": "2024-01-16T10:19:52Z",
|
||||
"pushed_at": "2022-12-08T06:04:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -108,10 +108,10 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2024-01-13T02:54:38Z",
|
||||
"updated_at": "2024-01-16T07:33:42Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 531,
|
||||
"watchers_count": 531,
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 531,
|
||||
"watchers": 532,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -179,36 +179,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 412724557,
|
||||
"name": "CVE-2021-22005-metasploit",
|
||||
"full_name": "TaroballzChen\/CVE-2021-22005-metasploit",
|
||||
"owner": {
|
||||
"login": "TaroballzChen",
|
||||
"id": 27862593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-22005-metasploit",
|
||||
"description": "the metasploit script(POC\/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T07:32:04Z",
|
||||
"updated_at": "2023-12-08T12:43:34Z",
|
||||
"pushed_at": "2021-10-02T08:21:38Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 420817779,
|
||||
"name": "CVE-2021-22005",
|
||||
|
|
|
@ -473,10 +473,10 @@
|
|||
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-11T04:34:07Z",
|
||||
"updated_at": "2024-01-13T02:52:05Z",
|
||||
"updated_at": "2024-01-16T09:00:34Z",
|
||||
"pushed_at": "2022-01-16T15:54:14Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -492,7 +492,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 195,
|
||||
"watchers": 196,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -89,36 +89,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 412296277,
|
||||
"name": "CVE-2021-22555-esc-priv",
|
||||
"full_name": "daletoniris\/CVE-2021-22555-esc-priv",
|
||||
"owner": {
|
||||
"login": "daletoniris",
|
||||
"id": 4347515,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4347515?v=4",
|
||||
"html_url": "https:\/\/github.com\/daletoniris"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/daletoniris\/CVE-2021-22555-esc-priv",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-01T02:18:45Z",
|
||||
"updated_at": "2021-10-01T02:19:18Z",
|
||||
"pushed_at": "2021-10-01T02:19:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 478003975,
|
||||
"name": "CVE-2021-22555-PipeVersion",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 413699979,
|
||||
"name": "CVE-2021-24545",
|
||||
"full_name": "V35HR4J\/CVE-2021-24545",
|
||||
"owner": {
|
||||
"login": "V35HR4J",
|
||||
"id": 54109630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
|
||||
"html_url": "https:\/\/github.com\/V35HR4J"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24545",
|
||||
"description": "The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post\/s.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T06:28:05Z",
|
||||
"updated_at": "2021-10-12T14:24:58Z",
|
||||
"pushed_at": "2021-10-05T06:29:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 424104785,
|
||||
"name": "CVE-2021-24545",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 413698388,
|
||||
"name": "CVE-2021-24563",
|
||||
"full_name": "V35HR4J\/CVE-2021-24563",
|
||||
"owner": {
|
||||
"login": "V35HR4J",
|
||||
"id": 54109630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
|
||||
"html_url": "https:\/\/github.com\/V35HR4J"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24563",
|
||||
"description": "The plugin does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T06:21:50Z",
|
||||
"updated_at": "2022-03-25T03:22:55Z",
|
||||
"pushed_at": "2021-10-05T06:30:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -843,36 +843,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 412676582,
|
||||
"name": "CVE-2021-26084",
|
||||
"full_name": "wdjcy\/CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "wdjcy",
|
||||
"id": 6531850,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531850?v=4",
|
||||
"html_url": "https:\/\/github.com\/wdjcy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wdjcy\/CVE-2021-26084",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T03:11:50Z",
|
||||
"updated_at": "2021-10-02T03:16:43Z",
|
||||
"pushed_at": "2021-10-02T03:16:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 414400971,
|
||||
"name": "CVE-2021-26084",
|
||||
|
@ -903,36 +873,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 419246152,
|
||||
"name": "CVE-2021-26084_Confluence",
|
||||
"full_name": "TheclaMcentire\/CVE-2021-26084_Confluence",
|
||||
"owner": {
|
||||
"login": "TheclaMcentire",
|
||||
"id": 86812068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86812068?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheclaMcentire"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheclaMcentire\/CVE-2021-26084_Confluence",
|
||||
"description": "Exploit CVE 2021 26084 Confluence",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-20T08:27:58Z",
|
||||
"updated_at": "2022-03-09T21:42:31Z",
|
||||
"pushed_at": "2021-09-08T11:04:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 420861154,
|
||||
"name": "CVE-2021-26084",
|
||||
|
@ -1023,36 +963,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 439271937,
|
||||
"name": "Confluence-CVE-2021-26084",
|
||||
"full_name": "30579096\/Confluence-CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "30579096",
|
||||
"id": 27181766,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27181766?v=4",
|
||||
"html_url": "https:\/\/github.com\/30579096"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/30579096\/Confluence-CVE-2021-26084",
|
||||
"description": "OGNL Injection in Confluence server version < 7.12.5",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-17T09:04:55Z",
|
||||
"updated_at": "2022-01-19T15:47:35Z",
|
||||
"pushed_at": "2021-09-03T07:37:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 447489190,
|
||||
"name": "CVE-2021-26084",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 413725319,
|
||||
"name": "nacos-cve-2021-29441",
|
||||
"full_name": "hh-hunter\/nacos-cve-2021-29441",
|
||||
"owner": {
|
||||
"login": "hh-hunter",
|
||||
"id": 91593280,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
|
||||
"html_url": "https:\/\/github.com\/hh-hunter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hh-hunter\/nacos-cve-2021-29441",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T07:59:05Z",
|
||||
"updated_at": "2021-10-05T07:59:17Z",
|
||||
"pushed_at": "2021-10-05T07:59:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 470076597,
|
||||
"name": "CVE-2021-29441",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2024-01-10T09:48:38Z",
|
||||
"updated_at": "2024-01-16T10:19:53Z",
|
||||
"pushed_at": "2021-09-28T04:08:43Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"stargazers_count": 384,
|
||||
"watchers_count": 384,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 385,
|
||||
"watchers": 384,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -185,36 +185,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 412824012,
|
||||
"name": "CVE-2021-3493",
|
||||
"full_name": "puckiestyle\/CVE-2021-3493",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-3493",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T14:44:43Z",
|
||||
"updated_at": "2023-01-10T03:23:13Z",
|
||||
"pushed_at": "2021-10-02T14:44:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 544564976,
|
||||
"name": "CVE-2021-3493",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 413549812,
|
||||
"name": "CVE-2021-39433",
|
||||
"full_name": "PinkDraconian\/CVE-2021-39433",
|
||||
"owner": {
|
||||
"login": "PinkDraconian",
|
||||
"id": 44903767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44903767?v=4",
|
||||
"html_url": "https:\/\/github.com\/PinkDraconian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PinkDraconian\/CVE-2021-39433",
|
||||
"description": "BIQS IT Biqs-drive v1.83",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-04T19:02:35Z",
|
||||
"updated_at": "2022-12-10T12:13:04Z",
|
||||
"pushed_at": "2021-10-04T19:02:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-01-15T23:13:33Z",
|
||||
"updated_at": "2024-01-16T06:57:02Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 933,
|
||||
"watchers_count": 933,
|
||||
"stargazers_count": 934,
|
||||
"watchers_count": 934,
|
||||
"has_discussions": false,
|
||||
"forks_count": 182,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 182,
|
||||
"watchers": 933,
|
||||
"watchers": 934,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
@ -4812,5 +4812,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 743945734,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "Pol-Ruiz\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Pol-Ruiz",
|
||||
"id": 151052652,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151052652?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pol-Ruiz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pol-Ruiz\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T10:18:38Z",
|
||||
"updated_at": "2024-01-16T10:19:27Z",
|
||||
"pushed_at": "2024-01-16T10:19:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -675,36 +675,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 417517068,
|
||||
"name": "MSHTML-CVE-2021-40444",
|
||||
"full_name": "metehangenel\/MSHTML-CVE-2021-40444",
|
||||
"owner": {
|
||||
"login": "metehangenel",
|
||||
"id": 31937891,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31937891?v=4",
|
||||
"html_url": "https:\/\/github.com\/metehangenel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/metehangenel\/MSHTML-CVE-2021-40444",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-15T13:52:34Z",
|
||||
"updated_at": "2022-12-16T15:56:59Z",
|
||||
"pushed_at": "2021-09-16T17:53:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 417810289,
|
||||
"name": "TIC4301_Project",
|
||||
|
|
|
@ -197,10 +197,10 @@
|
|||
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T17:55:52Z",
|
||||
"updated_at": "2024-01-12T13:11:26Z",
|
||||
"updated_at": "2024-01-16T09:07:19Z",
|
||||
"pushed_at": "2022-03-05T18:34:25Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -209,7 +209,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 412766915,
|
||||
"name": "CVE-2021-41511",
|
||||
"full_name": "vidvansh\/CVE-2021-41511",
|
||||
"owner": {
|
||||
"login": "vidvansh",
|
||||
"id": 56179464,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56179464?v=4",
|
||||
"html_url": "https:\/\/github.com\/vidvansh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vidvansh\/CVE-2021-41511",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T10:44:59Z",
|
||||
"updated_at": "2021-10-02T10:46:57Z",
|
||||
"pushed_at": "2021-10-02T10:46:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 413892415,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "numanturle\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
|
||||
"description": "CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T16:18:09Z",
|
||||
"updated_at": "2023-12-08T12:43:35Z",
|
||||
"pushed_at": "2021-10-05T16:48:27Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 413901787,
|
||||
"name": "CVE-2021-41773",
|
||||
|
@ -215,36 +185,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 413972926,
|
||||
"name": "POC-CVE-2021-41773",
|
||||
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "TishcaTpx",
|
||||
"id": 91351013,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
|
||||
"description": "Poc.py ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T20:41:34Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-05T21:29:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414013246,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"has_discussions": false,
|
||||
"forks_count": 191,
|
||||
"forks_count": 192,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 191,
|
||||
"forks": 192,
|
||||
"watchers": 949,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2024-01-14T10:17:26Z",
|
||||
"updated_at": "2024-01-16T09:21:11Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"stargazers_count": 1276,
|
||||
"watchers_count": 1276,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1275,
|
||||
"watchers": 1276,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows Common Log File System Driver POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T01:51:41Z",
|
||||
"updated_at": "2024-01-04T17:04:21Z",
|
||||
"updated_at": "2024-01-16T10:46:56Z",
|
||||
"pushed_at": "2021-12-21T06:57:06Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "a Proof of Concept of cve-2021-43226,stack overflow in Windows driver clfs.sys",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-30T06:47:50Z",
|
||||
"updated_at": "2023-10-30T06:51:42Z",
|
||||
"updated_at": "2024-01-16T10:47:51Z",
|
||||
"pushed_at": "2023-10-30T07:34:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1393,10 +1393,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2024-01-15T16:00:21Z",
|
||||
"updated_at": "2024-01-16T08:51:57Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
"stargazers_count": 853,
|
||||
"watchers_count": 853,
|
||||
"has_discussions": false,
|
||||
"forks_count": 177,
|
||||
"allow_forking": true,
|
||||
|
@ -1418,7 +1418,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 177,
|
||||
"watchers": 854,
|
||||
"watchers": 853,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
},
|
||||
|
@ -1497,7 +1497,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2023-12-21T17:39:07Z",
|
||||
"pushed_at": "2024-01-16T11:53:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
@ -9203,10 +9203,10 @@
|
|||
"description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T03:01:36Z",
|
||||
"updated_at": "2022-06-01T10:22:55Z",
|
||||
"updated_at": "2024-01-16T08:51:53Z",
|
||||
"pushed_at": "2022-01-24T16:43:41Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -9215,7 +9215,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 33,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -376,10 +376,10 @@
|
|||
"description": "Apisix系列漏洞:未授权漏洞(CVE-2021-45232)、默认秘钥(CVE-2020-13945)批量探测。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T12:26:11Z",
|
||||
"updated_at": "2023-12-01T08:07:24Z",
|
||||
"updated_at": "2024-01-16T08:55:32Z",
|
||||
"pushed_at": "2022-05-09T12:32:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -388,7 +388,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2022-0185 POC and Docker and Analysis write up",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T09:27:34Z",
|
||||
"updated_at": "2023-10-25T08:00:52Z",
|
||||
"updated_at": "2024-01-16T10:19:57Z",
|
||||
"pushed_at": "2022-05-24T11:18:03Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 37,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1871,10 +1871,10 @@
|
|||
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T08:31:32Z",
|
||||
"updated_at": "2024-01-12T13:11:31Z",
|
||||
"updated_at": "2024-01-16T08:41:18Z",
|
||||
"pushed_at": "2022-06-16T17:14:10Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -1891,7 +1891,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Security issue in the hypervisor firmware of some older Qualcomm chipsets",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-27T19:48:30Z",
|
||||
"updated_at": "2024-01-15T09:26:55Z",
|
||||
"updated_at": "2024-01-16T07:09:33Z",
|
||||
"pushed_at": "2022-12-27T20:32:37Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-09T18:28:00Z",
|
||||
"updated_at": "2023-09-06T10:47:51Z",
|
||||
"updated_at": "2024-01-16T09:35:12Z",
|
||||
"pushed_at": "2022-05-09T17:26:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2024-01-11T07:41:30Z",
|
||||
"updated_at": "2024-01-16T07:13:55Z",
|
||||
"pushed_at": "2023-03-04T05:52:28Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 459,
|
||||
"watchers": 460,
|
||||
"score": 0,
|
||||
"subscribers_count": 50
|
||||
},
|
||||
|
|
|
@ -257,10 +257,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2024-01-12T13:55:22Z",
|
||||
"updated_at": "2024-01-16T08:03:01Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 376,
|
||||
"watchers_count": 376,
|
||||
"stargazers_count": 377,
|
||||
"watchers_count": 377,
|
||||
"has_discussions": false,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
|
@ -269,7 +269,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 376,
|
||||
"watchers": 377,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for Arbitrary Code Execution in Notable",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-16T15:55:28Z",
|
||||
"updated_at": "2024-01-12T02:15:43Z",
|
||||
"updated_at": "2024-01-16T06:54:53Z",
|
||||
"pushed_at": "2023-03-13T03:30:16Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-01T03:41:36Z",
|
||||
"updated_at": "2023-09-30T19:44:45Z",
|
||||
"updated_at": "2024-01-16T10:20:00Z",
|
||||
"pushed_at": "2022-11-01T05:25:52Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 29,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -202,13 +202,13 @@
|
|||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE analysis for CVE-2023-0669",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-26T02:33:54Z",
|
||||
"updated_at": "2024-01-12T02:15:38Z",
|
||||
"updated_at": "2024-01-16T06:54:31Z",
|
||||
"pushed_at": "2023-03-12T17:37:44Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 743946606,
|
||||
"name": "CVE-2023-1326",
|
||||
"full_name": "Pol-Ruiz\/CVE-2023-1326",
|
||||
"owner": {
|
||||
"login": "Pol-Ruiz",
|
||||
"id": 151052652,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151052652?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pol-Ruiz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pol-Ruiz\/CVE-2023-1326",
|
||||
"description": "Esto es una prueba de concepto propia i basica de la vulneravilidad CVE-2023-1326",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T10:20:53Z",
|
||||
"updated_at": "2024-01-16T10:20:53Z",
|
||||
"pushed_at": "2024-01-16T10:21:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-21T00:31:50Z",
|
||||
"updated_at": "2024-01-02T10:32:29Z",
|
||||
"updated_at": "2024-01-16T08:52:16Z",
|
||||
"pushed_at": "2023-08-21T00:33:08Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T13:54:42Z",
|
||||
"updated_at": "2023-12-17T23:21:02Z",
|
||||
"updated_at": "2024-01-16T11:02:07Z",
|
||||
"pushed_at": "2023-02-24T13:29:38Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 106,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 106,
|
||||
"watchers": 9,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T21:40:09Z",
|
||||
"updated_at": "2024-01-13T09:47:31Z",
|
||||
"updated_at": "2024-01-16T06:45:58Z",
|
||||
"pushed_at": "2023-10-17T22:04:13Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
32
2023/CVE-2023-22527.json
Normal file
32
2023/CVE-2023-22527.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 743909012,
|
||||
"name": "CVE-2023-22527_Confluence_RCE",
|
||||
"full_name": "Avento\/CVE-2023-22527_Confluence_RCE",
|
||||
"owner": {
|
||||
"login": "Avento",
|
||||
"id": 13798539,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13798539?v=4",
|
||||
"html_url": "https:\/\/github.com\/Avento"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Avento\/CVE-2023-22527_Confluence_RCE",
|
||||
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T08:46:21Z",
|
||||
"updated_at": "2024-01-16T08:46:22Z",
|
||||
"pushed_at": "2024-01-16T09:54:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2024-01-05T08:40:07Z",
|
||||
"updated_at": "2024-01-16T10:20:02Z",
|
||||
"pushed_at": "2023-09-10T10:44:32Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 235,
|
||||
"watchers": 234,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -228,13 +228,13 @@
|
|||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-24T21:59:23Z",
|
||||
"updated_at": "2024-01-10T18:16:32Z",
|
||||
"updated_at": "2024-01-16T08:53:08Z",
|
||||
"pushed_at": "2023-10-12T19:18:32Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-34312",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-27T12:44:42Z",
|
||||
"updated_at": "2024-01-12T13:09:37Z",
|
||||
"updated_at": "2024-01-16T10:20:02Z",
|
||||
"pushed_at": "2023-05-27T12:45:10Z",
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 418,
|
||||
"watchers": 417,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/actuator"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/actuator\/7-Eleven-Bluetooth-Smart-Cup-Jailbreak",
|
||||
"description": "'Hacking' a 7-Eleven Bluetooth Smart Cup | CVE-2023-34761",
|
||||
"description": "'Hacking' a 7-Eleven Bluetooth Smart Cup 😅 | CVE-2023-34761",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-04T18:37:39Z",
|
||||
"updated_at": "2024-01-01T20:18:00Z",
|
||||
"updated_at": "2024-01-16T08:05:04Z",
|
||||
"pushed_at": "2023-06-23T00:10:55Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-11T19:17:13Z",
|
||||
"updated_at": "2024-01-16T04:18:58Z",
|
||||
"updated_at": "2024-01-16T12:15:49Z",
|
||||
"pushed_at": "2024-01-11T19:42:03Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 70,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Windows SmartScreen Security Feature Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-28T23:29:04Z",
|
||||
"updated_at": "2024-01-10T00:34:18Z",
|
||||
"updated_at": "2024-01-16T11:37:41Z",
|
||||
"pushed_at": "2023-12-29T22:11:48Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-37903 ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-05T11:23:15Z",
|
||||
"updated_at": "2024-01-15T05:16:06Z",
|
||||
"updated_at": "2024-01-16T10:20:04Z",
|
||||
"pushed_at": "2023-11-05T12:19:32Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-06T01:40:34Z",
|
||||
"updated_at": "2024-01-16T04:46:15Z",
|
||||
"updated_at": "2024-01-16T08:25:58Z",
|
||||
"pushed_at": "2023-10-07T03:26:00Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-15T07:58:28Z",
|
||||
"updated_at": "2024-01-15T09:36:28Z",
|
||||
"updated_at": "2024-01-16T08:59:45Z",
|
||||
"pushed_at": "2024-01-15T15:16:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2024-01-13T23:27:32Z",
|
||||
"updated_at": "2024-01-16T10:20:04Z",
|
||||
"pushed_at": "2023-12-07T03:10:06Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 160,
|
||||
"watchers": 159,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-14T18:30:11Z",
|
||||
"updated_at": "2024-01-16T04:34:03Z",
|
||||
"updated_at": "2024-01-16T08:08:56Z",
|
||||
"pushed_at": "2024-01-16T05:48:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -29,8 +29,38 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 743894339,
|
||||
"name": "CVE-2023-46805",
|
||||
"full_name": "cbeek-r7\/CVE-2023-46805",
|
||||
"owner": {
|
||||
"login": "cbeek-r7",
|
||||
"id": 117099647,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117099647?v=4",
|
||||
"html_url": "https:\/\/github.com\/cbeek-r7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cbeek-r7\/CVE-2023-46805",
|
||||
"description": "Simple scanner for scanning a list of ip-addresses for vulnerable Ivanti Pulse Secure devices",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T08:05:58Z",
|
||||
"updated_at": "2024-01-16T10:57:23Z",
|
||||
"pushed_at": "2024-01-16T08:27:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -284,7 +284,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-12T09:34:57Z",
|
||||
"updated_at": "2024-01-13T09:36:42Z",
|
||||
"pushed_at": "2024-01-15T07:40:03Z",
|
||||
"pushed_at": "2024-01-16T10:06:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-13T10:11:18Z",
|
||||
"updated_at": "2024-01-14T17:12:41Z",
|
||||
"updated_at": "2024-01-16T10:51:59Z",
|
||||
"pushed_at": "2024-01-13T10:30:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -124,10 +124,10 @@
|
|||
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T14:20:10Z",
|
||||
"updated_at": "2024-01-16T06:01:04Z",
|
||||
"updated_at": "2024-01-16T10:30:40Z",
|
||||
"pushed_at": "2024-01-02T15:43:26Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -184,10 +184,10 @@
|
|||
"description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-06T04:07:07Z",
|
||||
"updated_at": "2024-01-15T08:35:17Z",
|
||||
"updated_at": "2024-01-16T07:35:34Z",
|
||||
"pushed_at": "2024-01-06T10:33:34Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -196,7 +196,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-6875 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-13T15:23:17Z",
|
||||
"updated_at": "2024-01-16T03:00:44Z",
|
||||
"updated_at": "2024-01-16T11:22:51Z",
|
||||
"pushed_at": "2024-01-15T10:58:20Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -106,19 +106,19 @@
|
|||
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T18:29:27Z",
|
||||
"updated_at": "2024-01-16T03:07:32Z",
|
||||
"updated_at": "2024-01-16T12:06:20Z",
|
||||
"pushed_at": "2024-01-13T13:50:20Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 146,
|
||||
"forks": 25,
|
||||
"watchers": 148,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T15:08:01Z",
|
||||
"updated_at": "2024-01-16T06:03:26Z",
|
||||
"updated_at": "2024-01-16T10:59:47Z",
|
||||
"pushed_at": "2024-01-14T07:14:33Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 76,
|
||||
"forks": 11,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-14T18:30:11Z",
|
||||
"updated_at": "2024-01-16T04:34:03Z",
|
||||
"updated_at": "2024-01-16T08:08:56Z",
|
||||
"pushed_at": "2024-01-16T05:48:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
43
README.md
43
README.md
|
@ -214,6 +214,7 @@
|
|||
</code>
|
||||
|
||||
- [diego-tella/CVE-2023-1326-PoC](https://github.com/diego-tella/CVE-2023-1326-PoC)
|
||||
- [Pol-Ruiz/CVE-2023-1326](https://github.com/Pol-Ruiz/CVE-2023-1326)
|
||||
|
||||
### CVE-2023-1337 (2023-03-10)
|
||||
|
||||
|
@ -1669,6 +1670,13 @@
|
|||
- [imperva/CVE-2023-22524](https://github.com/imperva/CVE-2023-22524)
|
||||
- [ron-imperva/CVE-2023-22524](https://github.com/ron-imperva/CVE-2023-22524)
|
||||
|
||||
### CVE-2023-22527 (-)
|
||||
|
||||
<code>Summary of Vulnerability\nA template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.\n\nSee “What You Need to Do” for detailed instructions.\n\n{panel:bgColor=#deebff}\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\n{panel}\n\nAffected Versions\n\n||Product||Affected Versions||\n|Confluence Data Center and Server|8.0.x\n8.1.x\n8.2.x\n8.3.x\n8.4.x\n8.5.0\n8.5.1\n8.5.2\n8.5.3|\n\nFixed Versions\n\n||Product||Fixed Versions||\n|Confluence Data Center and Server|8.5.4 (LTS)|\n|Confluence Data Center|8.6.0 or later (Data Center Only)\n8.7.1 or later (Data Center Only)|\n\nWhat You Need To Do\nImmediately patch to a fixed version\n\nAtlassian recommends that you patch each of your affected installations to the latest version. The listed Fixed Versions are no longer the most up-to-date versions and do not protect your instance from other non-critical vulnerabilities as outlined in Atlassian’s January Security Bulletin.\n\n||Product||Fixed Versions||Latest Versions||\n|Confluence Data Center and Server|8.5.4 (LTS)|8.5.5 (LTS)|\n|Confluence Data Center|8.6.0 or later (Data Center Only)\n8.7.1 or later (Data Center Only)|8.7.2 or later (Data Center Only)|\n\nFor additional details, please see full advisory.
|
||||
</code>
|
||||
|
||||
- [Avento/CVE-2023-22527_Confluence_RCE](https://github.com/Avento/CVE-2023-22527_Confluence_RCE)
|
||||
|
||||
### CVE-2023-22551 (2023-01-01)
|
||||
|
||||
<code>The FTP (aka "Implementation of a simple FTP client and server") project through 96c1a35 allows remote attackers to cause a denial of service (memory consumption) by engaging in client activity, such as establishing and then terminating a connection. This occurs because malloc is used but free is not.
|
||||
|
@ -5803,6 +5811,7 @@
|
|||
</code>
|
||||
|
||||
- [yoryio/CVE-2023-46805_CVE-2024-21887_Scanner](https://github.com/yoryio/CVE-2023-46805_CVE-2024-21887_Scanner)
|
||||
- [cbeek-r7/CVE-2023-46805](https://github.com/cbeek-r7/CVE-2023-46805)
|
||||
|
||||
### CVE-2023-46813 (2023-10-26)
|
||||
|
||||
|
@ -13775,7 +13784,6 @@
|
|||
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
|
||||
- [derek-turing/CVE-2021-3493](https://github.com/derek-turing/CVE-2021-3493)
|
||||
- [cerodah/overlayFS-CVE-2021-3493](https://github.com/cerodah/overlayFS-CVE-2021-3493)
|
||||
- [puckiestyle/CVE-2021-3493](https://github.com/puckiestyle/CVE-2021-3493)
|
||||
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
|
||||
- [fei9747/CVE-2021-3493](https://github.com/fei9747/CVE-2021-3493)
|
||||
- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
|
||||
|
@ -14053,6 +14061,7 @@
|
|||
- [cdxiaodong/CVE-2021-4034-touch](https://github.com/cdxiaodong/CVE-2021-4034-touch)
|
||||
- [LucasPDiniz/CVE-2021-4034](https://github.com/LucasPDiniz/CVE-2021-4034)
|
||||
- [lluriam19/CVE-2021-4034-Vuln](https://github.com/lluriam19/CVE-2021-4034-Vuln)
|
||||
- [Pol-Ruiz/CVE-2021-4034](https://github.com/Pol-Ruiz/CVE-2021-4034)
|
||||
|
||||
### CVE-2021-4043 (2022-02-04)
|
||||
|
||||
|
@ -14493,7 +14502,6 @@
|
|||
- [5gstudent/CVE-2021-22005-](https://github.com/5gstudent/CVE-2021-22005-)
|
||||
- [RedTeamExp/CVE-2021-22005_PoC](https://github.com/RedTeamExp/CVE-2021-22005_PoC)
|
||||
- [rwincey/CVE-2021-22005](https://github.com/rwincey/CVE-2021-22005)
|
||||
- [TaroballzChen/CVE-2021-22005-metasploit](https://github.com/TaroballzChen/CVE-2021-22005-metasploit)
|
||||
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
|
||||
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
|
||||
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
|
||||
|
@ -14648,7 +14656,6 @@
|
|||
- [JoneyJunior/cve-2021-22555](https://github.com/JoneyJunior/cve-2021-22555)
|
||||
- [xyjl-ly/CVE-2021-22555-Exploit](https://github.com/xyjl-ly/CVE-2021-22555-Exploit)
|
||||
- [cgwalters/container-cve-2021-22555](https://github.com/cgwalters/container-cve-2021-22555)
|
||||
- [daletoniris/CVE-2021-22555-esc-priv](https://github.com/daletoniris/CVE-2021-22555-esc-priv)
|
||||
- [veritas501/CVE-2021-22555-PipeVersion](https://github.com/veritas501/CVE-2021-22555-PipeVersion)
|
||||
- [masjohncook/netsec-project](https://github.com/masjohncook/netsec-project)
|
||||
- [tukru/CVE-2021-22555](https://github.com/tukru/CVE-2021-22555)
|
||||
|
@ -14896,16 +14903,8 @@
|
|||
<code>The WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.
|
||||
</code>
|
||||
|
||||
- [V35HR4J/CVE-2021-24545](https://github.com/V35HR4J/CVE-2021-24545)
|
||||
- [dnr6419/CVE-2021-24545](https://github.com/dnr6419/CVE-2021-24545)
|
||||
|
||||
### CVE-2021-24563 (2021-10-11)
|
||||
|
||||
<code>The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
|
||||
</code>
|
||||
|
||||
- [V35HR4J/CVE-2021-24563](https://github.com/V35HR4J/CVE-2021-24563)
|
||||
|
||||
### CVE-2021-24647 (2021-11-08)
|
||||
|
||||
<code>The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.1.7.6 has a flaw in the social login implementation, allowing unauthenticated attacker to login as any user on the site by only knowing their user ID or username
|
||||
|
@ -15125,13 +15124,10 @@
|
|||
- [nizar0x1f/CVE-2021-26084-patch-](https://github.com/nizar0x1f/CVE-2021-26084-patch-)
|
||||
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
|
||||
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
|
||||
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
|
||||
- [orangmuda/CVE-2021-26084](https://github.com/orangmuda/CVE-2021-26084)
|
||||
- [TheclaMcentire/CVE-2021-26084_Confluence](https://github.com/TheclaMcentire/CVE-2021-26084_Confluence)
|
||||
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
|
||||
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
|
||||
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
|
||||
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
|
||||
- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
|
||||
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
|
||||
|
||||
|
@ -15686,7 +15682,6 @@
|
|||
<code>Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
|
||||
</code>
|
||||
|
||||
- [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441)
|
||||
- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
|
||||
|
||||
### CVE-2021-29447 (2021-04-15)
|
||||
|
@ -17048,13 +17043,6 @@
|
|||
|
||||
- [StefanDorresteijn/CVE-2021-39409](https://github.com/StefanDorresteijn/CVE-2021-39409)
|
||||
|
||||
### CVE-2021-39433 (2021-10-04)
|
||||
|
||||
<code>A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.
|
||||
</code>
|
||||
|
||||
- [PinkDraconian/CVE-2021-39433](https://github.com/PinkDraconian/CVE-2021-39433)
|
||||
|
||||
### CVE-2021-39473 (2022-11-04)
|
||||
|
||||
<code>Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.
|
||||
|
@ -17270,7 +17258,6 @@
|
|||
- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
|
||||
- [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021)
|
||||
- [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444)
|
||||
- [metehangenel/MSHTML-CVE-2021-40444](https://github.com/metehangenel/MSHTML-CVE-2021-40444)
|
||||
- [Jeromeyoung/TIC4301_Project](https://github.com/Jeromeyoung/TIC4301_Project)
|
||||
- [tiagob0b/CVE-2021-40444](https://github.com/tiagob0b/CVE-2021-40444)
|
||||
- [wh00datz/CVE-2021-40444-POC](https://github.com/wh00datz/CVE-2021-40444-POC)
|
||||
|
@ -17518,13 +17505,6 @@
|
|||
|
||||
- [Net-hunter121/CVE-2021-41381](https://github.com/Net-hunter121/CVE-2021-41381)
|
||||
|
||||
### CVE-2021-41511 (2021-10-04)
|
||||
|
||||
<code>The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
|
||||
</code>
|
||||
|
||||
- [vidvansh/CVE-2021-41511](https://github.com/vidvansh/CVE-2021-41511)
|
||||
|
||||
### CVE-2021-41560 (2021-12-15)
|
||||
|
||||
<code>OpenCATS through 0.9.6 allows remote attackers to execute arbitrary code by uploading an executable file via lib/FileUtility.php.
|
||||
|
@ -17618,13 +17598,11 @@
|
|||
</code>
|
||||
|
||||
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
|
||||
- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
|
||||
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
|
||||
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
|
||||
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
|
||||
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
|
||||
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
|
||||
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
|
||||
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
|
||||
|
@ -38444,6 +38422,7 @@
|
|||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
|
||||
- [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447)
|
||||
- [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3)
|
||||
- [Ziemni/CVE-2007-2447-in-Python](https://github.com/Ziemni/CVE-2007-2447-in-Python)
|
||||
- [0xKn/CVE-2007-2447](https://github.com/0xKn/CVE-2007-2447)
|
||||
|
|
Loading…
Add table
Reference in a new issue