mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/06/08 12:38:29
This commit is contained in:
parent
70eba3ca46
commit
c726c355fe
58 changed files with 558 additions and 262 deletions
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 50999434,
|
||||
"name": "springcss-cve-2014-3625",
|
||||
"full_name": "ilmila\/springcss-cve-2014-3625",
|
||||
"owner": {
|
||||
"login": "ilmila",
|
||||
"id": 2845952,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2845952?v=4",
|
||||
"html_url": "https:\/\/github.com\/ilmila"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ilmila\/springcss-cve-2014-3625",
|
||||
"description": "spring mvc cve-2014-3625",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-03T12:51:44Z",
|
||||
"updated_at": "2022-06-13T06:40:39Z",
|
||||
"pushed_at": "2016-03-11T14:30:45Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 72024287,
|
||||
"name": "SpringPathTraversal",
|
||||
|
|
|
@ -85,34 +85,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 54528087,
|
||||
"name": "CVE-2014-4322",
|
||||
"full_name": "koozxcv\/CVE-2014-4322",
|
||||
"owner": {
|
||||
"login": "koozxcv",
|
||||
"id": 15362158,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15362158?v=4",
|
||||
"html_url": "https:\/\/github.com\/koozxcv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/koozxcv\/CVE-2014-4322",
|
||||
"description": "must run this native binary with system privilege",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-23T03:29:27Z",
|
||||
"updated_at": "2016-03-23T03:34:24Z",
|
||||
"pushed_at": "2016-03-23T08:30:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2023-05-21T21:12:34Z",
|
||||
"updated_at": "2023-06-08T06:55:00Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"vulnerable-container"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"forks": 156,
|
||||
"watchers": 390,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -281,7 +281,7 @@
|
|||
"description": "# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to \/usr\/share\/metasploit-framework\/modules\/exploits\/windows\/local\/ 2) Copy the cve-2017-11882.rtf to \/usr\/share\/metasploit-framework\/data\/exploits\/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-24T07:11:13Z",
|
||||
"updated_at": "2017-11-24T07:11:13Z",
|
||||
"updated_at": "2023-06-08T10:38:50Z",
|
||||
"pushed_at": "2017-11-24T07:11:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -27,34 +27,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 419955901,
|
||||
"name": "CVE-2017-3241",
|
||||
"full_name": "scopion\/CVE-2017-3241",
|
||||
"owner": {
|
||||
"login": "scopion",
|
||||
"id": 27413591,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27413591?v=4",
|
||||
"html_url": "https:\/\/github.com\/scopion"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/scopion\/CVE-2017-3241",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-22T03:39:01Z",
|
||||
"updated_at": "2021-10-22T03:40:45Z",
|
||||
"pushed_at": "2021-10-22T03:40:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 728,
|
||||
"watchers_count": 728,
|
||||
"has_discussions": false,
|
||||
"forks_count": 186,
|
||||
"forks_count": 185,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"spectre"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 186,
|
||||
"forks": 185,
|
||||
"watchers": 728,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2023-06-04T18:36:53Z",
|
||||
"updated_at": "2023-06-08T08:21:26Z",
|
||||
"pushed_at": "2022-12-27T20:25:09Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T16:08:35Z",
|
||||
"updated_at": "2023-06-05T07:08:46Z",
|
||||
"updated_at": "2023-06-08T12:05:45Z",
|
||||
"pushed_at": "2021-01-29T16:22:39Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2023-06-07T06:48:05Z",
|
||||
"updated_at": "2023-06-08T07:11:57Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 608,
|
||||
"watchers_count": 608,
|
||||
"stargazers_count": 609,
|
||||
"watchers_count": 609,
|
||||
"has_discussions": false,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"watchers": 608,
|
||||
"watchers": 609,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1827,10 +1827,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2023-05-23T08:11:38Z",
|
||||
"updated_at": "2023-06-08T08:04:39Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1138,
|
||||
"watchers_count": 1138,
|
||||
"stargazers_count": 1139,
|
||||
"watchers_count": 1139,
|
||||
"has_discussions": false,
|
||||
"forks_count": 354,
|
||||
"allow_forking": true,
|
||||
|
@ -1839,7 +1839,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 354,
|
||||
"watchers": 1138,
|
||||
"watchers": 1139,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-02T12:50:46Z",
|
||||
"updated_at": "2022-11-24T11:09:58Z",
|
||||
"updated_at": "2023-06-08T07:14:15Z",
|
||||
"pushed_at": "2019-05-07T11:50:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -216,10 +216,10 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2023-06-01T14:58:19Z",
|
||||
"updated_at": "2023-06-08T08:15:49Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -237,7 +237,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 128,
|
||||
"watchers": 129,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -115,6 +115,35 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 210371345,
|
||||
"name": "Make-and-Break",
|
||||
"full_name": "Rayferrufino\/Make-and-Break",
|
||||
"owner": {
|
||||
"login": "Rayferrufino",
|
||||
"id": 52383730,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52383730?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rayferrufino"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rayferrufino\/Make-and-Break",
|
||||
"description": "Built a custom Virtual Machine, running Ubuntu 18.04.1 and Webmin 1.810. Using CVE-2019-15107 to exploit a backdoor in the Linux machine",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T14:07:03Z",
|
||||
"updated_at": "2022-11-24T11:10:56Z",
|
||||
"pushed_at": "2019-09-26T03:33:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217217171,
|
||||
"name": "WebminRCE-EXP-CVE-2019-15107-",
|
||||
|
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 210890120,
|
||||
"name": "CVE-2019-5475-Nexus-Repository-Manager-",
|
||||
"full_name": "jaychouzzk\/CVE-2019-5475-Nexus-Repository-Manager-",
|
||||
"owner": {
|
||||
"login": "jaychouzzk",
|
||||
"id": 45549315,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4",
|
||||
"html_url": "https:\/\/github.com\/jaychouzzk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-5475-Nexus-Repository-Manager-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-25T16:22:56Z",
|
||||
"updated_at": "2022-10-14T09:07:14Z",
|
||||
"pushed_at": "2019-09-25T16:33:53Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 255116667,
|
||||
"name": "CVE-2019-5475-EXP",
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "poc for cve-2020-0022",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-15T16:55:44Z",
|
||||
"updated_at": "2022-11-09T18:06:18Z",
|
||||
"updated_at": "2023-06-08T06:42:28Z",
|
||||
"pushed_at": "2020-07-16T06:51:16Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2020/CVE-2020-0136.json
Normal file
31
2020/CVE-2020-0136.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 511398155,
|
||||
"name": "libhwbinder_AOSP10_r33_CVE-2020-0136",
|
||||
"full_name": "Satheesh575555\/libhwbinder_AOSP10_r33_CVE-2020-0136",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/libhwbinder_AOSP10_r33_CVE-2020-0136",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-07T05:42:42Z",
|
||||
"updated_at": "2022-07-07T05:44:21Z",
|
||||
"pushed_at": "2022-07-07T05:44:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"forks": 57,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1032,10 +1032,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2023-06-05T08:25:01Z",
|
||||
"updated_at": "2023-06-08T06:31:09Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1252,
|
||||
"watchers_count": 1252,
|
||||
"stargazers_count": 1253,
|
||||
"watchers_count": 1253,
|
||||
"has_discussions": false,
|
||||
"forks_count": 367,
|
||||
"allow_forking": true,
|
||||
|
@ -1050,7 +1050,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 367,
|
||||
"watchers": 1252,
|
||||
"watchers": 1253,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2433,13 +2433,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2023-06-07T16:09:03Z",
|
||||
"updated_at": "2023-06-08T11:58:29Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 1039,
|
||||
"watchers_count": 1039,
|
||||
"stargazers_count": 1040,
|
||||
"watchers_count": 1040,
|
||||
"has_discussions": false,
|
||||
"forks_count": 275,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 275,
|
||||
"watchers": 1039,
|
||||
"watchers": 1040,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -134,7 +134,7 @@
|
|||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"has_discussions": false,
|
||||
"forks_count": 324,
|
||||
"forks_count": 325,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -144,7 +144,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 324,
|
||||
"forks": 325,
|
||||
"watchers": 1035,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -846,6 +846,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 527251116,
|
||||
"name": "CVE-2020-1938",
|
||||
"full_name": "YounesTasra-R4z3rSw0rd\/CVE-2020-1938",
|
||||
"owner": {
|
||||
"login": "YounesTasra-R4z3rSw0rd",
|
||||
"id": 101610095,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610095?v=4",
|
||||
"html_url": "https:\/\/github.com\/YounesTasra-R4z3rSw0rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/YounesTasra-R4z3rSw0rd\/CVE-2020-1938",
|
||||
"description": "This is a modified version of the original GhostCat Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-21T15:44:45Z",
|
||||
"updated_at": "2023-04-16T17:29:07Z",
|
||||
"pushed_at": "2022-08-21T15:49:16Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 565419626,
|
||||
"name": "AttackTomcat",
|
||||
|
|
31
2020/CVE-2020-26878.json
Normal file
31
2020/CVE-2020-26878.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 547762035,
|
||||
"name": "CVE-2020-26878",
|
||||
"full_name": "htarsoo\/CVE-2020-26878",
|
||||
"owner": {
|
||||
"login": "htarsoo",
|
||||
"id": 70771759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70771759?v=4",
|
||||
"html_url": "https:\/\/github.com\/htarsoo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/htarsoo\/CVE-2020-26878",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-08T08:38:00Z",
|
||||
"updated_at": "2022-10-08T08:47:55Z",
|
||||
"pushed_at": "2022-10-08T08:47:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -56,5 +56,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 651017415,
|
||||
"name": "linux-4.19.72_CVE-2020-27786",
|
||||
"full_name": "Trinadh465\/linux-4.19.72_CVE-2020-27786",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/linux-4.19.72_CVE-2020-27786",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T10:01:33Z",
|
||||
"updated_at": "2023-06-08T10:07:26Z",
|
||||
"pushed_at": "2023-06-08T10:04:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -56,5 +56,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 544836274,
|
||||
"name": "PoC-for-CVE-2020-28948-CVE-2020-28949",
|
||||
"full_name": "JinHao-L\/PoC-for-CVE-2020-28948-CVE-2020-28949",
|
||||
"owner": {
|
||||
"login": "JinHao-L",
|
||||
"id": 52820430,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52820430?v=4",
|
||||
"html_url": "https:\/\/github.com\/JinHao-L"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JinHao-L\/PoC-for-CVE-2020-28948-CVE-2020-28949",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-03T10:10:11Z",
|
||||
"updated_at": "2022-10-03T10:19:11Z",
|
||||
"pushed_at": "2022-10-17T13:56:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2023-06-07T07:43:13Z",
|
||||
"updated_at": "2023-06-08T08:22:31Z",
|
||||
"pushed_at": "2023-06-08T04:01:33Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
|
@ -56,7 +56,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 438,
|
||||
"watchers": 439,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2023-06-02T15:24:44Z",
|
||||
"updated_at": "2023-06-08T07:29:40Z",
|
||||
"pushed_at": "2022-11-16T08:14:33Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"has_discussions": false,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
|
@ -143,7 +143,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"watchers": 230,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -458,10 +458,10 @@
|
|||
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-11T04:34:07Z",
|
||||
"updated_at": "2023-06-02T15:24:44Z",
|
||||
"updated_at": "2023-06-08T10:32:40Z",
|
||||
"pushed_at": "2022-01-16T15:54:14Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -477,7 +477,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -134,7 +134,7 @@
|
|||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"has_discussions": false,
|
||||
"forks_count": 324,
|
||||
"forks_count": 325,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -144,7 +144,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 324,
|
||||
"forks": 325,
|
||||
"watchers": 1035,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -196,10 +196,10 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2023-06-05T14:51:22Z",
|
||||
"updated_at": "2023-06-08T08:24:33Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -208,7 +208,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,10 +316,10 @@
|
|||
"description": "CVE-2021-41773 POC with Docker",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T02:30:40Z",
|
||||
"updated_at": "2023-05-29T19:02:12Z",
|
||||
"updated_at": "2023-06-08T08:10:57Z",
|
||||
"pushed_at": "2022-10-07T23:37:10Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -328,7 +328,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1978,10 +1978,10 @@
|
|||
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-26T17:56:25Z",
|
||||
"updated_at": "2023-06-08T04:56:21Z",
|
||||
"updated_at": "2023-06-08T08:02:30Z",
|
||||
"pushed_at": "2021-10-26T18:04:43Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1990,7 +1990,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -696,5 +696,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 650990250,
|
||||
"name": "cve-2021-42013-httpd",
|
||||
"full_name": "cybfar\/cve-2021-42013-httpd",
|
||||
"owner": {
|
||||
"login": "cybfar",
|
||||
"id": 96472592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96472592?v=4",
|
||||
"html_url": "https:\/\/github.com\/cybfar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cybfar\/cve-2021-42013-httpd",
|
||||
"description": "CVE: 2021-42013 Tested on: 2.4.49 and 2.4.50 Description: Path Traversal or Remote Code Execution vulnerabilities in Apache 2.4.49 and 2.4.50",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T08:49:15Z",
|
||||
"updated_at": "2023-06-08T08:52:32Z",
|
||||
"pushed_at": "2023-06-08T09:34:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "NoPacScan is a CVE-2021-42287\/CVE-2021-42278 Scanner,it scan for more domain controllers than other script",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-07T11:59:55Z",
|
||||
"updated_at": "2023-04-14T08:56:02Z",
|
||||
"updated_at": "2023-06-08T06:45:35Z",
|
||||
"pushed_at": "2022-02-17T04:12:08Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -56,5 +56,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 650974335,
|
||||
"name": "CVE-2021-43617",
|
||||
"full_name": "Sybelle03\/CVE-2021-43617",
|
||||
"owner": {
|
||||
"login": "Sybelle03",
|
||||
"id": 107751839,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107751839?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sybelle03"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sybelle03\/CVE-2021-43617",
|
||||
"description": "This is a reproduction of PHP Laravel 8.70.1 - Cross Site Scripting (XSS) to Cross Site Request Forgery (CSRF) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T08:05:36Z",
|
||||
"updated_at": "2023-06-08T08:35:51Z",
|
||||
"pushed_at": "2023-06-08T08:38:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -363,7 +363,7 @@
|
|||
"stargazers_count": 1062,
|
||||
"watchers_count": 1062,
|
||||
"has_discussions": false,
|
||||
"forks_count": 501,
|
||||
"forks_count": 502,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -371,7 +371,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 501,
|
||||
"forks": 502,
|
||||
"watchers": 1062,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -880,10 +880,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-06-07T02:10:59Z",
|
||||
"updated_at": "2023-06-08T12:16:42Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1592,
|
||||
"watchers_count": 1592,
|
||||
"stargazers_count": 1593,
|
||||
"watchers_count": 1593,
|
||||
"has_discussions": false,
|
||||
"forks_count": 467,
|
||||
"allow_forking": true,
|
||||
|
@ -897,7 +897,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 467,
|
||||
"watchers": 1592,
|
||||
"watchers": 1593,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3589,10 +3589,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-06-07T22:03:11Z",
|
||||
"updated_at": "2023-06-08T11:32:26Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3253,
|
||||
"watchers_count": 3253,
|
||||
"stargazers_count": 3254,
|
||||
"watchers_count": 3254,
|
||||
"has_discussions": true,
|
||||
"forks_count": 744,
|
||||
"allow_forking": true,
|
||||
|
@ -3601,7 +3601,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 744,
|
||||
"watchers": 3253,
|
||||
"watchers": 3254,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1175,10 +1175,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-06-07T20:53:37Z",
|
||||
"updated_at": "2023-06-08T06:45:00Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"stargazers_count": 416,
|
||||
"watchers_count": 416,
|
||||
"has_discussions": false,
|
||||
"forks_count": 122,
|
||||
"allow_forking": true,
|
||||
|
@ -1187,7 +1187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 122,
|
||||
"watchers": 415,
|
||||
"watchers": 416,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2023-06-05T02:58:03Z",
|
||||
"updated_at": "2023-06-08T07:48:35Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 142,
|
||||
"forks": 20,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-06-07T05:15:30Z",
|
||||
"updated_at": "2023-06-08T09:09:53Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 706,
|
||||
"watchers_count": 706,
|
||||
"stargazers_count": 707,
|
||||
"watchers_count": 707,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 706,
|
||||
"watchers": 707,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -586,10 +586,10 @@
|
|||
"description": "CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-18T11:43:00Z",
|
||||
"updated_at": "2023-05-23T08:05:35Z",
|
||||
"updated_at": "2023-06-08T08:51:28Z",
|
||||
"pushed_at": "2023-03-18T11:47:55Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -598,7 +598,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2023-06-08T00:35:18Z",
|
||||
"updated_at": "2023-06-08T10:38:53Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 538,
|
||||
"watchers": 539,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -221,7 +221,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-02T08:48:35Z",
|
||||
"updated_at": "2023-06-01T07:45:43Z",
|
||||
"pushed_at": "2023-05-25T08:40:25Z",
|
||||
"pushed_at": "2023-06-08T09:30:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -311,10 +311,10 @@
|
|||
"description": "CobaltStrike <= 4.7.1 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T11:46:01Z",
|
||||
"updated_at": "2023-06-07T11:46:30Z",
|
||||
"updated_at": "2023-06-08T06:44:24Z",
|
||||
"pushed_at": "2022-10-25T05:32:54Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -323,7 +323,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 330,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2023-06-08T05:29:55Z",
|
||||
"updated_at": "2023-06-08T06:54:04Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 231,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-06-02T15:25:04Z",
|
||||
"updated_at": "2023-06-08T08:30:22Z",
|
||||
"pushed_at": "2023-02-21T04:16:19Z",
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"stargazers_count": 806,
|
||||
"watchers_count": 806,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 807,
|
||||
"watchers": 806,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2023/CVE-2023-10608.json
Normal file
31
2023/CVE-2023-10608.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 651022706,
|
||||
"name": "cve-2023-10608-PoC",
|
||||
"full_name": "b35363\/cve-2023-10608-PoC",
|
||||
"owner": {
|
||||
"login": "b35363",
|
||||
"id": 120607606,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120607606?v=4",
|
||||
"html_url": "https:\/\/github.com\/b35363"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b35363\/cve-2023-10608-PoC",
|
||||
"description": "cve-2023-10608 Proof Of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T10:16:41Z",
|
||||
"updated_at": "2023-06-08T10:31:49Z",
|
||||
"pushed_at": "2023-06-08T10:32:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -90,5 +90,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 651069957,
|
||||
"name": "CVE-2023-2033",
|
||||
"full_name": "WalccDev\/CVE-2023-2033",
|
||||
"owner": {
|
||||
"login": "WalccDev",
|
||||
"id": 135978726,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135978726?v=4",
|
||||
"html_url": "https:\/\/github.com\/WalccDev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WalccDev\/CVE-2023-2033",
|
||||
"description": "cve-2023-2033 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T12:29:08Z",
|
||||
"updated_at": "2023-06-08T12:33:41Z",
|
||||
"pushed_at": "2023-06-08T12:35:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -49,10 +49,10 @@
|
|||
"description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T14:59:42Z",
|
||||
"updated_at": "2023-06-03T13:33:41Z",
|
||||
"updated_at": "2023-06-08T09:23:10Z",
|
||||
"pushed_at": "2023-05-15T12:12:33Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-11T07:37:52Z",
|
||||
"updated_at": "2023-06-07T15:20:53Z",
|
||||
"updated_at": "2023-06-08T09:32:52Z",
|
||||
"pushed_at": "2023-06-02T02:52:35Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 142,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-06T14:05:09Z",
|
||||
"updated_at": "2023-06-08T05:53:25Z",
|
||||
"pushed_at": "2023-06-07T19:38:16Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"updated_at": "2023-06-08T12:38:59Z",
|
||||
"pushed_at": "2023-06-08T09:05:21Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 65,
|
||||
"forks": 18,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -46,12 +46,12 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2023-06-05T18:15:06Z",
|
||||
"updated_at": "2023-06-08T08:29:20Z",
|
||||
"pushed_at": "2023-06-03T19:35:51Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -65,8 +65,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 106,
|
||||
"forks": 19,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-22T21:34:06Z",
|
||||
"updated_at": "2023-05-25T15:30:46Z",
|
||||
"updated_at": "2023-06-08T11:48:14Z",
|
||||
"pushed_at": "2023-05-01T19:31:20Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"gitlab"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2023-28771 based on Rapid7's excellent writeup",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-23T02:37:39Z",
|
||||
"updated_at": "2023-06-07T01:38:26Z",
|
||||
"updated_at": "2023-06-08T11:03:36Z",
|
||||
"pushed_at": "2023-05-23T02:49:05Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -44,10 +44,10 @@
|
|||
"description": "The script is designed to facilitate testing and exploration of the IKEv2 protocol in vulnerable devices, based on Rapid7's exploitation techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-03T15:40:50Z",
|
||||
"updated_at": "2023-06-07T01:35:35Z",
|
||||
"updated_at": "2023-06-08T11:03:38Z",
|
||||
"pushed_at": "2023-06-03T15:45:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -56,7 +56,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-03T14:13:48Z",
|
||||
"updated_at": "2023-06-07T05:32:38Z",
|
||||
"updated_at": "2023-06-08T09:38:33Z",
|
||||
"pushed_at": "2023-06-03T14:15:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"forks": 57,
|
||||
"watchers": 236,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T02:18:29Z",
|
||||
"updated_at": "2023-06-07T07:18:40Z",
|
||||
"updated_at": "2023-06-08T07:42:44Z",
|
||||
"pushed_at": "2023-05-30T02:43:06Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "SCM Manager XSS",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-07T04:20:54Z",
|
||||
"updated_at": "2023-06-07T04:22:39Z",
|
||||
"updated_at": "2023-06-08T11:31:10Z",
|
||||
"pushed_at": "2023-06-07T04:21:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2023/CVE-2023-51504.json
Normal file
31
2023/CVE-2023-51504.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 650964426,
|
||||
"name": "CVE-2023-51504",
|
||||
"full_name": "Sybelle03\/CVE-2023-51504",
|
||||
"owner": {
|
||||
"login": "Sybelle03",
|
||||
"id": 107751839,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107751839?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sybelle03"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sybelle03\/CVE-2023-51504",
|
||||
"description": "This is a dockerized reproduction of the MotoCMS SQL injection (cf exploit db) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T07:37:08Z",
|
||||
"updated_at": "2023-06-08T08:01:23Z",
|
||||
"pushed_at": "2023-06-08T08:45:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
33
README.md
33
README.md
|
@ -221,6 +221,7 @@ Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote a
|
|||
- [insoxin/CVE-2023-2033](https://github.com/insoxin/CVE-2023-2033)
|
||||
- [sandumjacob/CVE-2023-2033-Analysis](https://github.com/sandumjacob/CVE-2023-2033-Analysis)
|
||||
- [gretchenfrage/CVE-2023-2033-analysis](https://github.com/gretchenfrage/CVE-2023-2033-analysis)
|
||||
- [WalccDev/CVE-2023-2033](https://github.com/WalccDev/CVE-2023-2033)
|
||||
|
||||
### CVE-2023-2114 (2023-05-08)
|
||||
|
||||
|
@ -313,6 +314,9 @@ Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampas
|
|||
|
||||
- [mnqazi/CVE-2023-3009](https://github.com/mnqazi/CVE-2023-3009)
|
||||
|
||||
### CVE-2023-10608
|
||||
- [b35363/cve-2023-10608-PoC](https://github.com/b35363/cve-2023-10608-PoC)
|
||||
|
||||
### CVE-2023-20052 (2023-03-01)
|
||||
|
||||
<code>
|
||||
|
@ -1675,6 +1679,9 @@ In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.
|
|||
- [deepinstinct/MOVEit_CVE-2023-34362_IOCs](https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs)
|
||||
- [hheeyywweellccoommee/CVE-2023-34362-nhjxn](https://github.com/hheeyywweellccoommee/CVE-2023-34362-nhjxn)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
||||
|
||||
## 2022
|
||||
### CVE-2022-0185 (2022-02-11)
|
||||
|
@ -13336,6 +13343,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
|
|||
- [mightysai1997/cve-2021-42013L](https://github.com/mightysai1997/cve-2021-42013L)
|
||||
- [mightysai1997/cve-2021-42013.get](https://github.com/mightysai1997/cve-2021-42013.get)
|
||||
- [12345qwert123456/CVE-2021-42013](https://github.com/12345qwert123456/CVE-2021-42013)
|
||||
- [cybfar/cve-2021-42013-httpd](https://github.com/cybfar/cve-2021-42013-httpd)
|
||||
|
||||
### CVE-2021-42056 (2022-06-24)
|
||||
|
||||
|
@ -13813,6 +13821,7 @@ Laravel Framework through 8.70.2 does not sufficiently block the upload of execu
|
|||
|
||||
- [kombat1/CVE-2021-43617](https://github.com/kombat1/CVE-2021-43617)
|
||||
- [aweiiy/CVE-2021-43617](https://github.com/aweiiy/CVE-2021-43617)
|
||||
- [Sybelle03/CVE-2021-43617](https://github.com/Sybelle03/CVE-2021-43617)
|
||||
|
||||
### CVE-2021-43657 (2022-12-21)
|
||||
|
||||
|
@ -14989,6 +14998,14 @@ In updateUidProcState of AppOpsService.java, there is a possible permission bypa
|
|||
|
||||
- [mooneee/CVE-2020-0121](https://github.com/mooneee/CVE-2020-0121)
|
||||
|
||||
### CVE-2020-0136 (2020-06-11)
|
||||
|
||||
<code>
|
||||
In multiple locations of Parcel.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-120078455
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/libhwbinder_AOSP10_r33_CVE-2020-0136](https://github.com/Satheesh575555/libhwbinder_AOSP10_r33_CVE-2020-0136)
|
||||
|
||||
### CVE-2020-0137 (2020-06-11)
|
||||
|
||||
<code>
|
||||
|
@ -15973,6 +15990,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
|||
- [Neko-chanQwQ/CVE-2020-1938](https://github.com/Neko-chanQwQ/CVE-2020-1938)
|
||||
- [jptr218/ghostcat](https://github.com/jptr218/ghostcat)
|
||||
- [einzbernnn/CVE-2020-1938Scan](https://github.com/einzbernnn/CVE-2020-1938Scan)
|
||||
- [YounesTasra-R4z3rSw0rd/CVE-2020-1938](https://github.com/YounesTasra-R4z3rSw0rd/CVE-2020-1938)
|
||||
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
|
||||
|
||||
### CVE-2020-1947 (2020-03-11)
|
||||
|
@ -19754,6 +19772,14 @@ Cross Site Scripting (XSS) in Configuration page in SKYWORTH GN542VF Hardware Ve
|
|||
|
||||
- [swzhouu/CVE-2020-26733](https://github.com/swzhouu/CVE-2020-26733)
|
||||
|
||||
### CVE-2020-26878 (2020-10-26)
|
||||
|
||||
<code>
|
||||
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
|
||||
</code>
|
||||
|
||||
- [htarsoo/CVE-2020-26878](https://github.com/htarsoo/CVE-2020-26878)
|
||||
|
||||
### CVE-2020-27190
|
||||
- [qlh831/x-CVE-2020-27190](https://github.com/qlh831/x-CVE-2020-27190)
|
||||
|
||||
|
@ -19839,6 +19865,7 @@ A flaw was found in the Linux kernel’s implementation of MIDI, where an attack
|
|||
|
||||
- [kiks7/CVE-2020-27786-Kernel-Exploit](https://github.com/kiks7/CVE-2020-27786-Kernel-Exploit)
|
||||
- [elbiazo/CVE-2020-27786](https://github.com/elbiazo/CVE-2020-27786)
|
||||
- [Trinadh465/linux-4.19.72_CVE-2020-27786](https://github.com/Trinadh465/linux-4.19.72_CVE-2020-27786)
|
||||
|
||||
### CVE-2020-27824 (2021-05-13)
|
||||
|
||||
|
@ -20077,6 +20104,7 @@ Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blo
|
|||
|
||||
- [0x240x23elu/CVE-2020-28948-and-CVE-2020-28949](https://github.com/0x240x23elu/CVE-2020-28948-and-CVE-2020-28949)
|
||||
- [nopdata/cve-2020-28948](https://github.com/nopdata/cve-2020-28948)
|
||||
- [JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949](https://github.com/JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949)
|
||||
|
||||
### CVE-2020-29007 (2023-04-15)
|
||||
|
||||
|
@ -21414,6 +21442,7 @@ SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to dest
|
|||
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
|
||||
</code>
|
||||
|
||||
- [jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-](https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-)
|
||||
- [rabbitmask/CVE-2019-5475-EXP](https://github.com/rabbitmask/CVE-2019-5475-EXP)
|
||||
- [EXP-Docs/CVE-2019-5475](https://github.com/EXP-Docs/CVE-2019-5475)
|
||||
|
||||
|
@ -23518,6 +23547,7 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_chan
|
|||
- [HACHp1/webmin_docker_and_exp](https://github.com/HACHp1/webmin_docker_and_exp)
|
||||
- [ketlerd/CVE-2019-15107](https://github.com/ketlerd/CVE-2019-15107)
|
||||
- [AdministratorGithub/CVE-2019-15107](https://github.com/AdministratorGithub/CVE-2019-15107)
|
||||
- [Rayferrufino/Make-and-Break](https://github.com/Rayferrufino/Make-and-Break)
|
||||
- [AleWong/WebminRCE-EXP-CVE-2019-15107-](https://github.com/AleWong/WebminRCE-EXP-CVE-2019-15107-)
|
||||
- [ianxtianxt/CVE-2019-15107](https://github.com/ianxtianxt/CVE-2019-15107)
|
||||
- [Pichuuuuu/verbose_happiness](https://github.com/Pichuuuuu/verbose_happiness)
|
||||
|
@ -28489,7 +28519,6 @@ Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java
|
|||
</code>
|
||||
|
||||
- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
|
||||
- [scopion/CVE-2017-3241](https://github.com/scopion/CVE-2017-3241)
|
||||
|
||||
### CVE-2017-3248 (2017-01-27)
|
||||
|
||||
|
@ -32580,7 +32609,6 @@ The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses
|
|||
Directory traversal vulnerability in Pivotal Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.
|
||||
</code>
|
||||
|
||||
- [ilmila/springcss-cve-2014-3625](https://github.com/ilmila/springcss-cve-2014-3625)
|
||||
- [gforresu/SpringPathTraversal](https://github.com/gforresu/SpringPathTraversal)
|
||||
|
||||
### CVE-2014-3704 (2014-10-15)
|
||||
|
@ -32645,7 +32673,6 @@ drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used i
|
|||
- [retme7/CVE-2014-4322_poc](https://github.com/retme7/CVE-2014-4322_poc)
|
||||
- [laginimaineb/cve-2014-4322](https://github.com/laginimaineb/cve-2014-4322)
|
||||
- [askk/CVE-2014-4322_adaptation](https://github.com/askk/CVE-2014-4322_adaptation)
|
||||
- [koozxcv/CVE-2014-4322](https://github.com/koozxcv/CVE-2014-4322)
|
||||
|
||||
### CVE-2014-4323 (2014-12-12)
|
||||
|
||||
|
|
Loading…
Reference in a new issue