Auto Update 2023/09/17 18:26:07

This commit is contained in:
motikan2010-bot 2023-09-18 03:26:07 +09:00
parent 453e7336f3
commit c5651c47c1
34 changed files with 150 additions and 150 deletions

View file

@ -117,6 +117,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-09-16T21:29:14Z",
"updated_at": "2023-09-17T15:18:50Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1781,
"watchers_count": 1781,
"stargazers_count": 1782,
"watchers_count": 1782,
"has_discussions": false,
"forks_count": 333,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 333,
"watchers": 1781,
"watchers": 1782,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-09-16T21:29:14Z",
"updated_at": "2023-09-17T15:18:50Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1781,
"watchers_count": 1781,
"stargazers_count": 1782,
"watchers_count": 1782,
"has_discussions": false,
"forks_count": 333,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 333,
"watchers": 1781,
"watchers": 1782,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-09-16T21:29:14Z",
"updated_at": "2023-09-17T15:18:50Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1781,
"watchers_count": 1781,
"stargazers_count": 1782,
"watchers_count": 1782,
"has_discussions": false,
"forks_count": 333,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 333,
"watchers": 1781,
"watchers": 1782,
"score": 0,
"subscribers_count": 34
},

View file

@ -27,7 +27,7 @@
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 562747008,

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-09-16T21:29:14Z",
"updated_at": "2023-09-17T15:18:50Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1781,
"watchers_count": 1781,
"stargazers_count": 1782,
"watchers_count": 1782,
"has_discussions": false,
"forks_count": 333,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 333,
"watchers": 1781,
"watchers": 1782,
"score": 0,
"subscribers_count": 34
},

View file

@ -27,7 +27,7 @@
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 5
"subscribers_count": 4
},
{
"id": 160289379,

View file

@ -87,7 +87,7 @@
"forks": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 244424491,

View file

@ -1858,10 +1858,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-09-16T21:22:40Z",
"updated_at": "2023-09-17T13:00:59Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1146,
"watchers_count": 1146,
"stargazers_count": 1147,
"watchers_count": 1147,
"has_discussions": false,
"forks_count": 355,
"allow_forking": true,
@ -1870,7 +1870,7 @@
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1146,
"watchers": 1147,
"score": 0,
"subscribers_count": 69
},

View file

@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2023-09-16T21:23:31Z",
"updated_at": "2023-09-17T15:55:41Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 275,
"watchers": 276,
"score": 0,
"subscribers_count": 9
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-09-16T21:29:14Z",
"updated_at": "2023-09-17T15:18:50Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1781,
"watchers_count": 1781,
"stargazers_count": 1782,
"watchers_count": 1782,
"has_discussions": false,
"forks_count": 333,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 333,
"watchers": 1781,
"watchers": 1782,
"score": 0,
"subscribers_count": 34
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-09-16T21:29:14Z",
"updated_at": "2023-09-17T15:18:50Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1781,
"watchers_count": 1781,
"stargazers_count": 1782,
"watchers_count": 1782,
"has_discussions": false,
"forks_count": 333,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 333,
"watchers": 1781,
"watchers": 1782,
"score": 0,
"subscribers_count": 34
},

View file

@ -142,10 +142,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2023-09-16T21:45:10Z",
"updated_at": "2023-09-17T14:29:33Z",
"pushed_at": "2022-11-16T13:14:56Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 2
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-09-17T09:47:52Z",
"updated_at": "2023-09-17T14:35:20Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1639,
"watchers_count": 1639,
"stargazers_count": 1640,
"watchers_count": 1640,
"has_discussions": false,
"forks_count": 485,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 485,
"watchers": 1639,
"watchers": 1640,
"score": 0,
"subscribers_count": 25
},
@ -3703,10 +3703,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-09-17T11:51:22Z",
"updated_at": "2023-09-17T16:54:17Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3287,
"watchers_count": 3287,
"stargazers_count": 3288,
"watchers_count": 3288,
"has_discussions": true,
"forks_count": 744,
"allow_forking": true,
@ -3715,7 +3715,7 @@
"topics": [],
"visibility": "public",
"forks": 744,
"watchers": 3287,
"watchers": 3288,
"score": 0,
"subscribers_count": 60
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2023-09-16T21:50:34Z",
"updated_at": "2023-09-17T12:55:38Z",
"pushed_at": "2022-04-25T04:11:33Z",
"stargazers_count": 362,
"watchers_count": 362,
"stargazers_count": 363,
"watchers_count": 363,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 362,
"watchers": 363,
"score": 0,
"subscribers_count": 39
},

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-0591 - Formcraft3 < 3.8.28 - Unauthenticated SSRF",
"fork": false,
"created_at": "2023-09-07T18:41:43Z",
"updated_at": "2023-09-07T19:21:47Z",
"updated_at": "2023-09-17T14:26:14Z",
"pushed_at": "2023-09-07T19:57:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -2562,5 +2562,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 692738777,
"name": "DirtyPipe",
"full_name": "pashayogi\/DirtyPipe",
"owner": {
"login": "pashayogi",
"id": 50790111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50790111?v=4",
"html_url": "https:\/\/github.com\/pashayogi"
},
"html_url": "https:\/\/github.com\/pashayogi\/DirtyPipe",
"description": "CVE: CVE-2022-0847",
"fork": false,
"created_at": "2023-09-17T12:43:52Z",
"updated_at": "2023-09-17T12:43:53Z",
"pushed_at": "2023-09-17T12:44:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 1036,
"watchers_count": 1036,
"has_discussions": true,
"forks_count": 181,
"forks_count": 182,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"gui"
],
"visibility": "public",
"forks": 181,
"forks": 182,
"watchers": 1036,
"score": 0,
"subscribers_count": 18

View file

@ -18,7 +18,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"intel-sgx-sdk"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 3

View file

@ -13,19 +13,19 @@
"description": "CVE-2022-32947 walkthough and demo",
"fork": false,
"created_at": "2023-09-17T08:21:47Z",
"updated_at": "2023-09-17T12:21:46Z",
"updated_at": "2023-09-17T17:42:47Z",
"pushed_at": "2023-09-17T10:40:10Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 13,
"forks": 2,
"watchers": 32,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery <= 2.19 - Unauthenticated RCE",
"fork": false,
"created_at": "2023-09-15T21:38:47Z",
"updated_at": "2023-09-16T14:46:39Z",
"updated_at": "2023-09-17T15:58:35Z",
"pushed_at": "2023-09-16T21:55:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2023-09-17T03:20:23Z",
"updated_at": "2023-09-17T03:39:03Z",
"updated_at": "2023-09-17T14:25:35Z",
"pushed_at": "2023-09-17T10:05:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-4063 - InPost Gallery < 2.1.4.1 - Unauthenticated LFI to RCE",
"fork": false,
"created_at": "2023-09-11T20:01:04Z",
"updated_at": "2023-09-11T21:08:43Z",
"updated_at": "2023-09-17T14:26:25Z",
"pushed_at": "2023-09-15T21:07:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -755,14 +755,14 @@
{
"id": 673282845,
"name": "CVE-2022-46169",
"full_name": "4m4Sec\/CVE-2022-46169",
"full_name": "dawnl3ss\/CVE-2022-46169",
"owner": {
"login": "4m4Sec",
"login": "dawnl3ss",
"id": 52249849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4",
"html_url": "https:\/\/github.com\/4m4Sec"
"html_url": "https:\/\/github.com\/dawnl3ss"
},
"html_url": "https:\/\/github.com\/4m4Sec\/CVE-2022-46169",
"html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2022-46169",
"description": "Unauthenticated Command Injection in Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-08-01T09:29:30Z",

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for checking vulnerability in CVE-2023-0159 - Extensive VC Addons for WPBakery page builder < 1.9.1 - Unauthenticated LFI",
"fork": false,
"created_at": "2023-09-11T11:36:35Z",
"updated_at": "2023-09-11T12:17:49Z",
"updated_at": "2023-09-17T14:26:38Z",
"pushed_at": "2023-09-11T12:18:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -193,10 +193,10 @@
"description": "Vulnerabilities Exploitation On Ubuntu 22.04",
"fork": false,
"created_at": "2023-05-16T10:26:10Z",
"updated_at": "2023-09-07T07:02:46Z",
"updated_at": "2023-09-17T17:17:27Z",
"pushed_at": "2023-05-16T10:49:19Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -207,7 +207,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 28,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)",
"fork": false,
"created_at": "2023-07-11T18:08:05Z",
"updated_at": "2023-09-06T18:15:53Z",
"updated_at": "2023-09-17T16:32:50Z",
"pushed_at": "2023-08-09T15:11:09Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,7 +13,7 @@
"description": "CVE-2023-30533",
"fork": false,
"created_at": "2023-08-09T06:48:32Z",
"updated_at": "2023-09-07T13:57:14Z",
"updated_at": "2023-09-17T13:03:19Z",
"pushed_at": "2023-08-09T06:52:13Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-09-16T21:59:15Z",
"updated_at": "2023-09-17T14:45:50Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 556,
"watchers_count": 556,
"stargazers_count": 555,
"watchers_count": 555,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 556,
"watchers": 555,
"score": 0,
"subscribers_count": 10
},
@ -185,14 +185,14 @@
{
"id": 685163840,
"name": "CVE-2023-32784",
"full_name": "4m4Sec\/CVE-2023-32784",
"full_name": "dawnl3ss\/CVE-2023-32784",
"owner": {
"login": "4m4Sec",
"login": "dawnl3ss",
"id": 52249849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4",
"html_url": "https:\/\/github.com\/4m4Sec"
"html_url": "https:\/\/github.com\/dawnl3ss"
},
"html_url": "https:\/\/github.com\/4m4Sec\/CVE-2023-32784",
"html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2023-32784",
"description": "Retrieve the master password of a keepass database <= 2.53.1",
"fork": false,
"created_at": "2023-08-30T16:42:19Z",

View file

@ -13,10 +13,10 @@
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
"fork": false,
"created_at": "2023-09-01T20:16:28Z",
"updated_at": "2023-09-17T09:04:02Z",
"updated_at": "2023-09-17T16:18:27Z",
"pushed_at": "2023-09-12T07:52:40Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 51,
"watchers": 53,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
"fork": false,
"created_at": "2023-09-13T04:00:14Z",
"updated_at": "2023-09-17T07:46:15Z",
"updated_at": "2023-09-17T17:08:07Z",
"pushed_at": "2023-09-13T04:50:29Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 80,
"watchers": 82,
"score": 0,
"subscribers_count": 2
}

View file

@ -174,10 +174,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2023-09-17T09:22:54Z",
"updated_at": "2023-09-17T13:06:00Z",
"pushed_at": "2023-08-28T20:41:57Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -186,7 +186,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 0
},
@ -692,36 +692,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 686761368,
"name": "CVE-2023-38831_WinRAR",
"full_name": "LuxCodeDev\/CVE-2023-38831_WinRAR",
"owner": {
"login": "LuxCodeDev",
"id": 130206074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130206074?v=4",
"html_url": "https:\/\/github.com\/LuxCodeDev"
},
"html_url": "https:\/\/github.com\/LuxCodeDev\/CVE-2023-38831_WinRAR",
"description": "Steps needed to obtain a reverse shell exploiting the winrar vulnerability CVE-2023-38831 in versions prior to 6.23.",
"fork": false,
"created_at": "2023-09-03T21:14:14Z",
"updated_at": "2023-09-03T21:17:38Z",
"pushed_at": "2023-09-03T21:17:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 688341659,
"name": "CVE-2023-38831-winrar",

View file

@ -2256,7 +2256,7 @@
- [z-jxy/keepass_dump](https://github.com/z-jxy/keepass_dump)
- [LeDocteurDesBits/cve-2023-32784](https://github.com/LeDocteurDesBits/cve-2023-32784)
- [hau-zy/KeePass-dump-py](https://github.com/hau-zy/KeePass-dump-py)
- [4m4Sec/CVE-2023-32784](https://github.com/4m4Sec/CVE-2023-32784)
- [dawnl3ss/CVE-2023-32784](https://github.com/dawnl3ss/CVE-2023-32784)
### CVE-2023-32961 (2023-06-12)
@ -3177,7 +3177,6 @@
- [K3rnel-Dev/WinrarExploit](https://github.com/K3rnel-Dev/WinrarExploit)
- [Fa1c0n35/CVE-2023-38831-winrar-exploit](https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit)
- [xaitax/WinRAR-CVE-2023-38831](https://github.com/xaitax/WinRAR-CVE-2023-38831)
- [LuxCodeDev/CVE-2023-38831_WinRAR](https://github.com/LuxCodeDev/CVE-2023-38831_WinRAR)
- [GOTonyGO/CVE-2023-38831-winrar](https://github.com/GOTonyGO/CVE-2023-38831-winrar)
- [Malwareman007/CVE-2023-38831](https://github.com/Malwareman007/CVE-2023-38831)
- [ameerpornillos/CVE-2023-38831-WinRAR-Exploit](https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit)
@ -3776,6 +3775,7 @@
- [jonathanbest7/cve-2022-0847](https://github.com/jonathanbest7/cve-2022-0847)
- [0xeremus/dirty-pipe-poc](https://github.com/0xeremus/dirty-pipe-poc)
- [joeymeech/CVE-2022-0847-Exploit-Implementation](https://github.com/joeymeech/CVE-2022-0847-Exploit-Implementation)
- [pashayogi/DirtyPipe](https://github.com/pashayogi/DirtyPipe)
### CVE-2022-0848 (2022-03-04)
@ -9344,7 +9344,7 @@
- [BKreisel/CVE-2022-46169](https://github.com/BKreisel/CVE-2022-46169)
- [Rickster5555/EH2-PoC](https://github.com/Rickster5555/EH2-PoC)
- [antisecc/CVE-2022-46169](https://github.com/antisecc/CVE-2022-46169)
- [4m4Sec/CVE-2022-46169](https://github.com/4m4Sec/CVE-2022-46169)
- [dawnl3ss/CVE-2022-46169](https://github.com/dawnl3ss/CVE-2022-46169)
- [a1665454764/CVE-2022-46169](https://github.com/a1665454764/CVE-2022-46169)
- [0xZon/CVE-2022-46169-Exploit](https://github.com/0xZon/CVE-2022-46169-Exploit)
- [copyleftdev/PricklyPwn](https://github.com/copyleftdev/PricklyPwn)