Auto Update 2023/10/13 18:31:51

This commit is contained in:
motikan2010-bot 2023-10-14 03:31:51 +09:00
parent 9ff2993522
commit c52fa1d5a4
43 changed files with 323 additions and 183 deletions

View file

@ -13,19 +13,19 @@
"description": "MS16-032(CVE-2016-0099) for SERVICE ONLY",
"fork": false,
"created_at": "2017-03-15T17:16:55Z",
"updated_at": "2023-09-28T10:39:57Z",
"updated_at": "2023-10-13T17:13:16Z",
"pushed_at": "2017-03-15T17:24:59Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 46,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 80,
"forks": 47,
"watchers": 81,
"score": 0,
"subscribers_count": 7
}

View file

@ -76,10 +76,10 @@
"description": "Exploiting CVE-2016-4657 to JailBreak the Nintendo Switch",
"fork": false,
"created_at": "2017-06-02T10:54:27Z",
"updated_at": "2023-01-17T19:49:47Z",
"updated_at": "2023-10-13T14:17:32Z",
"pushed_at": "2018-02-03T14:49:44Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -88,9 +88,9 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 52,
"watchers": 51,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 157086962,

View file

@ -18,13 +18,13 @@
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 93,
"score": 0,
"subscribers_count": 6

View file

@ -73,10 +73,10 @@
"description": "Source code and configuration files related to our article in MISC96",
"fork": false,
"created_at": "2018-03-01T11:03:08Z",
"updated_at": "2022-03-06T22:00:49Z",
"updated_at": "2023-10-13T14:17:46Z",
"pushed_at": "2018-03-01T12:55:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,9 +85,9 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 3
"subscribers_count": 2
},
{
"id": 136574054,
@ -133,10 +133,10 @@
"description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
"fork": false,
"created_at": "2020-05-08T15:10:38Z",
"updated_at": "2023-06-08T05:07:37Z",
"updated_at": "2023-10-13T14:18:13Z",
"pushed_at": "2020-06-26T13:39:16Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -150,7 +150,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 30,
"watchers": 29,
"score": 0,
"subscribers_count": 2
}

View file

@ -27,6 +27,6 @@
"forks": 4,
"watchers": 2,
"score": 0,
"subscribers_count": 4
"subscribers_count": 6
}
]

View file

@ -13,10 +13,10 @@
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2023-09-29T19:19:53Z",
"updated_at": "2023-10-13T14:18:01Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 199,
"watchers_count": 199,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -29,8 +29,8 @@
],
"visibility": "public",
"forks": 57,
"watchers": 200,
"watchers": 199,
"score": 0,
"subscribers_count": 33
"subscribers_count": 32
}
]

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-10-09T13:38:52Z",
"updated_at": "2023-10-13T16:59:44Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1149,
"watchers_count": 1149,
"stargazers_count": 1150,
"watchers_count": 1150,
"has_discussions": false,
"forks_count": 355,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1149,
"watchers": 1150,
"score": 0,
"subscribers_count": 69
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 1767,
"watchers_count": 1767,
"has_discussions": false,
"forks_count": 261,
"forks_count": 260,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 261,
"forks": 260,
"watchers": 1767,
"score": 0,
"subscribers_count": 38

View file

@ -13,8 +13,8 @@
"description": "Exploit for PyInstaller CVE-2019-16784",
"fork": false,
"created_at": "2020-01-22T13:23:45Z",
"updated_at": "2020-01-22T13:25:02Z",
"pushed_at": "2020-01-22T13:25:00Z",
"updated_at": "2023-10-13T14:27:04Z",
"pushed_at": "2023-10-13T14:27:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD",
"fork": false,
"created_at": "2021-04-14T20:37:38Z",
"updated_at": "2023-09-21T08:37:02Z",
"updated_at": "2023-10-13T14:18:24Z",
"pushed_at": "2021-04-14T21:36:08Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 16,
"watchers": 15,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "Atlassian Jira Server\/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)",
"fork": false,
"created_at": "2021-10-05T14:09:52Z",
"updated_at": "2023-09-28T11:32:02Z",
"updated_at": "2023-10-13T15:37:06Z",
"pushed_at": "2021-10-12T05:16:48Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 25,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)",
"fork": false,
"created_at": "2021-06-21T01:59:58Z",
"updated_at": "2023-09-19T02:44:24Z",
"updated_at": "2023-10-13T14:18:25Z",
"pushed_at": "2021-10-12T12:03:20Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 28,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2023-10-10T07:13:49Z",
"updated_at": "2023-10-13T15:37:11Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 89,
"watchers": 88,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2023-10-12T05:53:02Z",
"updated_at": "2023-10-13T13:52:55Z",
"pushed_at": "2023-07-10T16:41:49Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 275,
"watchers": 276,
"score": 0,
"subscribers_count": 8
},

View file

@ -43,10 +43,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2023-10-05T03:08:22Z",
"updated_at": "2023-10-13T15:27:19Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 210,
"watchers_count": 210,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 211,
"watchers": 210,
"score": 0,
"subscribers_count": 5
},

View file

@ -1423,10 +1423,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2023-10-01T15:01:16Z",
"updated_at": "2023-10-13T15:46:35Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 852,
"watchers_count": 852,
"stargazers_count": 853,
"watchers_count": 853,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -1448,7 +1448,7 @@
],
"visibility": "public",
"forks": 178,
"watchers": 852,
"watchers": 853,
"score": 0,
"subscribers_count": 33
},
@ -12313,10 +12313,10 @@
"description": "Utilize Tai-e to identify the Log4shell (a.k.a. CVE-2021-44228) Vulnerability",
"fork": false,
"created_at": "2023-10-06T04:36:31Z",
"updated_at": "2023-10-12T11:28:00Z",
"updated_at": "2023-10-13T15:29:38Z",
"pushed_at": "2023-10-06T09:30:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -12330,7 +12330,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2023-10-08T16:58:28Z",
"updated_at": "2023-10-13T12:47:12Z",
"pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 337,
"watchers_count": 337,
"stargazers_count": 338,
"watchers_count": 338,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 107,
"watchers": 337,
"watchers": 338,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "A Zeek package to detect CVE-2022-26937, a vulnerability in the Network Lock Manager (NLM) protocol in Windows NFS server.",
"fork": false,
"created_at": "2022-05-11T18:36:45Z",
"updated_at": "2023-03-21T20:23:54Z",
"updated_at": "2023-10-13T14:45:15Z",
"pushed_at": "2022-05-17T16:53:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Exploit of RealVNC VNC Server",
"fork": false,
"created_at": "2022-10-18T06:31:21Z",
"updated_at": "2023-09-28T11:43:28Z",
"updated_at": "2023-10-13T14:42:31Z",
"pushed_at": "2022-10-18T07:05:36Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-24T06:00:47Z",
"updated_at": "2023-09-28T11:42:10Z",
"updated_at": "2023-10-13T16:06:35Z",
"pushed_at": "2023-06-18T14:43:52Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 152,
"watchers": 153,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-10-11T01:29:43Z",
"updated_at": "2023-10-13T13:44:32Z",
"pushed_at": "2023-10-08T13:43:56Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 4
}

View file

@ -226,10 +226,10 @@
"description": "ImageMagick LFI PoC [CVE-2022-44268]",
"fork": false,
"created_at": "2023-02-06T10:44:43Z",
"updated_at": "2023-10-05T11:10:09Z",
"updated_at": "2023-10-13T16:53:46Z",
"pushed_at": "2023-08-16T15:37:00Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -242,7 +242,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 0
},
@ -625,5 +625,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 704595452,
"name": "IMAGE-MAGICK-CVE-2022-44268",
"full_name": "Vagebondcur\/IMAGE-MAGICK-CVE-2022-44268",
"owner": {
"login": "Vagebondcur",
"id": 103751916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103751916?v=4",
"html_url": "https:\/\/github.com\/Vagebondcur"
},
"html_url": "https:\/\/github.com\/Vagebondcur\/IMAGE-MAGICK-CVE-2022-44268",
"description": null,
"fork": false,
"created_at": "2023-10-13T15:43:49Z",
"updated_at": "2023-10-13T15:49:04Z",
"pushed_at": "2023-10-13T15:49:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-48150.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 624508549,
"name": "-CVE-2022-48150",
"full_name": "sahilop123\/-CVE-2022-48150",
"owner": {
"login": "sahilop123",
"id": 95895762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95895762?v=4",
"html_url": "https:\/\/github.com\/sahilop123"
},
"html_url": "https:\/\/github.com\/sahilop123\/-CVE-2022-48150",
"description": "I Found the reflected xss vulnerability in shopware 5 .for more details check my poc video ",
"fork": false,
"created_at": "2023-04-06T16:14:42Z",
"updated_at": "2023-04-06T16:27:14Z",
"pushed_at": "2023-04-06T19:01:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2023-10-13T12:06:19Z",
"updated_at": "2023-10-13T17:26:12Z",
"pushed_at": "2023-10-11T18:07:05Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 37,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},
@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false,
"created_at": "2023-10-11T08:42:17Z",
"updated_at": "2023-10-13T11:58:15Z",
"updated_at": "2023-10-13T17:26:20Z",
"pushed_at": "2023-10-12T02:21:47Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 38,
"watchers": 41,
"score": 0,
"subscribers_count": 1
},
@ -142,8 +142,8 @@
"description": "CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server",
"fork": false,
"created_at": "2023-10-11T11:21:47Z",
"updated_at": "2023-10-11T12:17:19Z",
"pushed_at": "2023-10-13T08:12:21Z",
"updated_at": "2023-10-13T14:39:52Z",
"pushed_at": "2023-10-13T15:31:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -275,7 +275,7 @@
"fork": false,
"created_at": "2023-10-13T08:36:21Z",
"updated_at": "2023-10-13T10:31:45Z",
"pushed_at": "2023-10-13T10:38:29Z",
"pushed_at": "2023-10-13T15:43:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-24488 PoC",
"fork": false,
"created_at": "2023-07-01T17:47:17Z",
"updated_at": "2023-10-10T13:39:15Z",
"updated_at": "2023-10-13T14:51:12Z",
"pushed_at": "2023-07-01T17:49:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -78,10 +78,10 @@
"description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0",
"fork": false,
"created_at": "2023-09-17T23:17:22Z",
"updated_at": "2023-10-08T19:25:44Z",
"updated_at": "2023-10-13T14:23:56Z",
"pushed_at": "2023-09-17T23:38:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -223,10 +223,10 @@
"description": "xortigate-cve-2023-27997",
"fork": false,
"created_at": "2023-10-12T16:12:41Z",
"updated_at": "2023-10-13T11:20:06Z",
"updated_at": "2023-10-13T17:41:43Z",
"pushed_at": "2023-10-12T16:17:23Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 17,
"watchers": 19,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2023-10-12T05:30:54Z",
"updated_at": "2023-10-13T17:35:24Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 156,
"watchers": 157,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-28T21:20:23Z",
"updated_at": "2023-10-13T09:29:15Z",
"updated_at": "2023-10-13T18:08:01Z",
"pushed_at": "2023-10-10T17:29:32Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 45,
"watchers": 47,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2023-10-13T09:36:53Z",
"updated_at": "2023-10-13T16:45:16Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 76,
"forks": 24,
"watchers": 80,
"score": 0,
"subscribers_count": 2
}

View file

@ -151,10 +151,10 @@
"html_url": "https:\/\/github.com\/zaenhaxor"
},
"html_url": "https:\/\/github.com\/zaenhaxor\/CVE-2023-36845",
"description": "CVE-2023-36845 ",
"description": "CVE-2023-36845 - Juniper Firewall Remote code execution (RCE)",
"fork": false,
"created_at": "2023-09-29T03:11:37Z",
"updated_at": "2023-10-09T20:44:22Z",
"updated_at": "2023-10-13T14:00:28Z",
"pushed_at": "2023-10-07T03:25:04Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-37988 - Wordpress\/Plugin - Contact Form Generator < Reflected Cross-Site Scripting [RXSS]",
"fork": false,
"created_at": "2023-10-07T23:40:53Z",
"updated_at": "2023-10-12T13:47:00Z",
"updated_at": "2023-10-13T13:08:35Z",
"pushed_at": "2023-10-07T23:42:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,5 +28,35 @@
"watchers": 148,
"score": 0,
"subscribers_count": 3
},
{
"id": 704591586,
"name": "CVE-2023-38146",
"full_name": "Jnnshschl\/CVE-2023-38146",
"owner": {
"login": "Jnnshschl",
"id": 26087286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26087286?v=4",
"html_url": "https:\/\/github.com\/Jnnshschl"
},
"html_url": "https:\/\/github.com\/Jnnshschl\/CVE-2023-38146",
"description": "PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket",
"fork": false,
"created_at": "2023-10-13T15:33:42Z",
"updated_at": "2023-10-13T15:38:38Z",
"pushed_at": "2023-10-13T15:39:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "😄 CVE-2023-38545堆溢出的POC和分析文章",
"fork": false,
"created_at": "2023-10-12T07:16:49Z",
"updated_at": "2023-10-12T09:48:35Z",
"updated_at": "2023-10-13T12:58:32Z",
"pushed_at": "2023-10-12T08:46:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "Simple PoC causing overflow",
"fork": false,
"created_at": "2023-10-12T07:39:15Z",
"updated_at": "2023-10-13T04:52:06Z",
"updated_at": "2023-10-13T13:57:35Z",
"pushed_at": "2023-10-12T08:09:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-42819",
"fork": false,
"created_at": "2023-10-12T08:45:46Z",
"updated_at": "2023-10-12T08:45:47Z",
"updated_at": "2023-10-13T12:58:58Z",
"pushed_at": "2023-10-13T02:27:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,19 +43,19 @@
"description": "CVE-2023-42820",
"fork": false,
"created_at": "2023-10-10T06:32:51Z",
"updated_at": "2023-10-13T11:58:21Z",
"updated_at": "2023-10-13T13:09:22Z",
"pushed_at": "2023-10-13T02:36:33Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 24,
"forks": 4,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

32
2023/CVE-2023-43144.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 704649398,
"name": "CVE-2023-43144",
"full_name": "Pegasus0xx\/CVE-2023-43144",
"owner": {
"login": "Pegasus0xx",
"id": 122263374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122263374?v=4",
"html_url": "https:\/\/github.com\/Pegasus0xx"
},
"html_url": "https:\/\/github.com\/Pegasus0xx\/CVE-2023-43144",
"description": "Assets Management System 1.0 is vulnerable to SQL injection via the id parameter in delete.php",
"fork": false,
"created_at": "2023-10-13T18:19:22Z",
"updated_at": "2023-10-13T18:19:22Z",
"pushed_at": "2023-10-13T18:20:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-43149",
"fork": false,
"created_at": "2023-10-12T16:11:39Z",
"updated_at": "2023-10-12T16:11:39Z",
"updated_at": "2023-10-13T12:57:57Z",
"pushed_at": "2023-10-12T16:23:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-10-13T12:42:47Z",
"updated_at": "2023-10-13T18:27:43Z",
"pushed_at": "2023-10-12T21:19:32Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 84,
"forks": 23,
"watchers": 105,
"score": 0,
"subscribers_count": 2
},
@ -43,10 +43,10 @@
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
"updated_at": "2023-10-13T11:27:27Z",
"updated_at": "2023-10-13T13:23:21Z",
"pushed_at": "2023-10-13T11:19:10Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 19,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -111,10 +111,10 @@
"description": "CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T07:06:42Z",
"updated_at": "2023-10-12T22:41:07Z",
"updated_at": "2023-10-13T16:10:25Z",
"pushed_at": "2023-10-12T07:11:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 225,
"watchers_count": 225,
"has_discussions": false,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 37,
"watchers": 225,
"score": 0,
"subscribers_count": 10

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2023-10-12T11:43:30Z",
"updated_at": "2023-10-13T13:07:50Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 321,
"watchers": 322,
"score": 0,
"subscribers_count": 2
},
@ -78,13 +78,13 @@
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 142,
"score": 0,
"subscribers_count": 3
@ -198,7 +198,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -208,7 +208,7 @@
"poc"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -3572,6 +3572,7 @@
</code>
- [gabe-k/themebleed](https://github.com/gabe-k/themebleed)
- [Jnnshschl/CVE-2023-38146](https://github.com/Jnnshschl/CVE-2023-38146)
### CVE-2023-38388
- [codeb0ss/CVE-2023-38388](https://github.com/codeb0ss/CVE-2023-38388)
@ -4125,6 +4126,13 @@
- [jostaub/ghostscript-CVE-2023-43115](https://github.com/jostaub/ghostscript-CVE-2023-43115)
### CVE-2023-43144 (2023-09-22)
<code>Projectworldsl Assets-management-system-in-php 1.0 is vulnerable to SQL Injection via the &quot;id&quot; parameter in delete.php.
</code>
- [Pegasus0xx/CVE-2023-43144](https://github.com/Pegasus0xx/CVE-2023-43144)
### CVE-2023-43147 (2023-10-12)
<code>PHPJabbers Limo Booking Software 1.0 is vulnerable to Cross Site Request Forgery (CSRF) to add an admin user via the Add Users Function, aka an index.php?controller=pjAdminUsers&amp;action=pjActionCreate URI.
@ -10059,6 +10067,7 @@
- [fanbyprinciple/ImageMagick-lfi-poc](https://github.com/fanbyprinciple/ImageMagick-lfi-poc)
- [chairat095/CVE-2022-44268_By_Kyokito](https://github.com/chairat095/CVE-2022-44268_By_Kyokito)
- [atici/Exploit-for-ImageMagick-CVE-2022-44268](https://github.com/atici/Exploit-for-ImageMagick-CVE-2022-44268)
- [Vagebondcur/IMAGE-MAGICK-CVE-2022-44268](https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268)
### CVE-2022-44276 (2023-06-28)
@ -10563,6 +10572,13 @@
- [dhina016/CVE-2022-47986](https://github.com/dhina016/CVE-2022-47986)
- [mauricelambert/CVE-2022-47986](https://github.com/mauricelambert/CVE-2022-47986)
### CVE-2022-48150 (2023-04-21)
<code>Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the recovery/install/ URI.
</code>
- [sahilop123/-CVE-2022-48150](https://github.com/sahilop123/-CVE-2022-48150)
### CVE-2022-48194 (2022-12-30)
<code>TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.