Auto Update 2023/06/08 12:38:29

This commit is contained in:
motikan2010-bot 2023-06-08 21:38:29 +09:00
parent 70eba3ca46
commit c726c355fe
58 changed files with 558 additions and 262 deletions

View file

@ -1,33 +1,4 @@
[
{
"id": 50999434,
"name": "springcss-cve-2014-3625",
"full_name": "ilmila\/springcss-cve-2014-3625",
"owner": {
"login": "ilmila",
"id": 2845952,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2845952?v=4",
"html_url": "https:\/\/github.com\/ilmila"
},
"html_url": "https:\/\/github.com\/ilmila\/springcss-cve-2014-3625",
"description": "spring mvc cve-2014-3625",
"fork": false,
"created_at": "2016-02-03T12:51:44Z",
"updated_at": "2022-06-13T06:40:39Z",
"pushed_at": "2016-03-11T14:30:45Z",
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 32,
"score": 0
},
{
"id": 72024287,
"name": "SpringPathTraversal",

View file

@ -85,34 +85,5 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 54528087,
"name": "CVE-2014-4322",
"full_name": "koozxcv\/CVE-2014-4322",
"owner": {
"login": "koozxcv",
"id": 15362158,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15362158?v=4",
"html_url": "https:\/\/github.com\/koozxcv"
},
"html_url": "https:\/\/github.com\/koozxcv\/CVE-2014-4322",
"description": "must run this native binary with system privilege",
"fork": false,
"created_at": "2016-03-23T03:29:27Z",
"updated_at": "2016-03-23T03:34:24Z",
"pushed_at": "2016-03-23T08:30:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2023-05-21T21:12:34Z",
"updated_at": "2023-06-08T06:55:00Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 54,
"watchers": 110,
"watchers": 111,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 390,
"watchers_count": 390,
"has_discussions": false,
"forks_count": 155,
"forks_count": 156,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 155,
"forks": 156,
"watchers": 390,
"score": 0
},

View file

@ -281,7 +281,7 @@
"description": "# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to \/usr\/share\/metasploit-framework\/modules\/exploits\/windows\/local\/ 2) Copy the cve-2017-11882.rtf to \/usr\/share\/metasploit-framework\/data\/exploits\/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.",
"fork": false,
"created_at": "2017-11-24T07:11:13Z",
"updated_at": "2017-11-24T07:11:13Z",
"updated_at": "2023-06-08T10:38:50Z",
"pushed_at": "2017-11-24T07:11:14Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -27,34 +27,5 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 419955901,
"name": "CVE-2017-3241",
"full_name": "scopion\/CVE-2017-3241",
"owner": {
"login": "scopion",
"id": 27413591,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27413591?v=4",
"html_url": "https:\/\/github.com\/scopion"
},
"html_url": "https:\/\/github.com\/scopion\/CVE-2017-3241",
"description": null,
"fork": false,
"created_at": "2021-10-22T03:39:01Z",
"updated_at": "2021-10-22T03:40:45Z",
"pushed_at": "2021-10-22T03:40:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 728,
"watchers_count": 728,
"has_discussions": false,
"forks_count": 186,
"forks_count": 185,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"spectre"
],
"visibility": "public",
"forks": 186,
"forks": 185,
"watchers": 728,
"score": 0
},

View file

@ -71,10 +71,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2023-06-04T18:36:53Z",
"updated_at": "2023-06-08T08:21:26Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 347,
"watchers": 348,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2023-06-05T07:08:46Z",
"updated_at": "2023-06-08T12:05:45Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 63,
"watchers": 64,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2023-06-07T06:48:05Z",
"updated_at": "2023-06-08T07:11:57Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 608,
"watchers_count": 608,
"stargazers_count": 609,
"watchers_count": 609,
"has_discussions": false,
"forks_count": 130,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 130,
"watchers": 608,
"watchers": 609,
"score": 0
}
]

View file

@ -1827,10 +1827,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-05-23T08:11:38Z",
"updated_at": "2023-06-08T08:04:39Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1138,
"watchers_count": 1138,
"stargazers_count": 1139,
"watchers_count": 1139,
"has_discussions": false,
"forks_count": 354,
"allow_forking": true,
@ -1839,7 +1839,7 @@
"topics": [],
"visibility": "public",
"forks": 354,
"watchers": 1138,
"watchers": 1139,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6",
"fork": false,
"created_at": "2019-04-02T12:50:46Z",
"updated_at": "2022-11-24T11:09:58Z",
"updated_at": "2023-06-08T07:14:15Z",
"pushed_at": "2019-05-07T11:50:39Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -216,10 +216,10 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2023-06-01T14:58:19Z",
"updated_at": "2023-06-08T08:15:49Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -237,7 +237,7 @@
],
"visibility": "public",
"forks": 62,
"watchers": 128,
"watchers": 129,
"score": 0
},
{

View file

@ -115,6 +115,35 @@
"watchers": 4,
"score": 0
},
{
"id": 210371345,
"name": "Make-and-Break",
"full_name": "Rayferrufino\/Make-and-Break",
"owner": {
"login": "Rayferrufino",
"id": 52383730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52383730?v=4",
"html_url": "https:\/\/github.com\/Rayferrufino"
},
"html_url": "https:\/\/github.com\/Rayferrufino\/Make-and-Break",
"description": "Built a custom Virtual Machine, running Ubuntu 18.04.1 and Webmin 1.810. Using CVE-2019-15107 to exploit a backdoor in the Linux machine",
"fork": false,
"created_at": "2019-09-23T14:07:03Z",
"updated_at": "2022-11-24T11:10:56Z",
"pushed_at": "2019-09-26T03:33:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 217217171,
"name": "WebminRCE-EXP-CVE-2019-15107-",

View file

@ -1,4 +1,33 @@
[
{
"id": 210890120,
"name": "CVE-2019-5475-Nexus-Repository-Manager-",
"full_name": "jaychouzzk\/CVE-2019-5475-Nexus-Repository-Manager-",
"owner": {
"login": "jaychouzzk",
"id": 45549315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4",
"html_url": "https:\/\/github.com\/jaychouzzk"
},
"html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-5475-Nexus-Repository-Manager-",
"description": null,
"fork": false,
"created_at": "2019-09-25T16:22:56Z",
"updated_at": "2022-10-14T09:07:14Z",
"pushed_at": "2019-09-25T16:33:53Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"score": 0
},
{
"id": 255116667,
"name": "CVE-2019-5475-EXP",

View file

@ -42,10 +42,10 @@
"description": "poc for cve-2020-0022",
"fork": false,
"created_at": "2020-02-15T16:55:44Z",
"updated_at": "2022-11-09T18:06:18Z",
"updated_at": "2023-06-08T06:42:28Z",
"pushed_at": "2020-07-16T06:51:16Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

31
2020/CVE-2020-0136.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 511398155,
"name": "libhwbinder_AOSP10_r33_CVE-2020-0136",
"full_name": "Satheesh575555\/libhwbinder_AOSP10_r33_CVE-2020-0136",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/libhwbinder_AOSP10_r33_CVE-2020-0136",
"description": null,
"fork": false,
"created_at": "2022-07-07T05:42:42Z",
"updated_at": "2022-07-07T05:44:21Z",
"pushed_at": "2022-07-07T05:44:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 56,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 56,
"forks": 57,
"watchers": 331,
"score": 0
}

View file

@ -1032,10 +1032,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2023-06-05T08:25:01Z",
"updated_at": "2023-06-08T06:31:09Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1252,
"watchers_count": 1252,
"stargazers_count": 1253,
"watchers_count": 1253,
"has_discussions": false,
"forks_count": 367,
"allow_forking": true,
@ -1050,7 +1050,7 @@
],
"visibility": "public",
"forks": 367,
"watchers": 1252,
"watchers": 1253,
"score": 0
},
{
@ -2433,13 +2433,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 4,
"score": 0
}

View file

@ -100,10 +100,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2023-06-07T16:09:03Z",
"updated_at": "2023-06-08T11:58:29Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1039,
"watchers_count": 1039,
"stargazers_count": 1040,
"watchers_count": 1040,
"has_discussions": false,
"forks_count": 275,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 275,
"watchers": 1039,
"watchers": 1040,
"score": 0
},
{

View file

@ -134,7 +134,7 @@
"stargazers_count": 1035,
"watchers_count": 1035,
"has_discussions": false,
"forks_count": 324,
"forks_count": 325,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -144,7 +144,7 @@
"poc"
],
"visibility": "public",
"forks": 324,
"forks": 325,
"watchers": 1035,
"score": 0
}

View file

@ -846,6 +846,35 @@
"watchers": 1,
"score": 0
},
{
"id": 527251116,
"name": "CVE-2020-1938",
"full_name": "YounesTasra-R4z3rSw0rd\/CVE-2020-1938",
"owner": {
"login": "YounesTasra-R4z3rSw0rd",
"id": 101610095,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610095?v=4",
"html_url": "https:\/\/github.com\/YounesTasra-R4z3rSw0rd"
},
"html_url": "https:\/\/github.com\/YounesTasra-R4z3rSw0rd\/CVE-2020-1938",
"description": "This is a modified version of the original GhostCat Exploit",
"fork": false,
"created_at": "2022-08-21T15:44:45Z",
"updated_at": "2023-04-16T17:29:07Z",
"pushed_at": "2022-08-21T15:49:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 565419626,
"name": "AttackTomcat",

31
2020/CVE-2020-26878.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 547762035,
"name": "CVE-2020-26878",
"full_name": "htarsoo\/CVE-2020-26878",
"owner": {
"login": "htarsoo",
"id": 70771759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70771759?v=4",
"html_url": "https:\/\/github.com\/htarsoo"
},
"html_url": "https:\/\/github.com\/htarsoo\/CVE-2020-26878",
"description": null,
"fork": false,
"created_at": "2022-10-08T08:38:00Z",
"updated_at": "2022-10-08T08:47:55Z",
"pushed_at": "2022-10-08T08:47:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -56,5 +56,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 651017415,
"name": "linux-4.19.72_CVE-2020-27786",
"full_name": "Trinadh465\/linux-4.19.72_CVE-2020-27786",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/linux-4.19.72_CVE-2020-27786",
"description": null,
"fork": false,
"created_at": "2023-06-08T10:01:33Z",
"updated_at": "2023-06-08T10:07:26Z",
"pushed_at": "2023-06-08T10:04:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -56,5 +56,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 544836274,
"name": "PoC-for-CVE-2020-28948-CVE-2020-28949",
"full_name": "JinHao-L\/PoC-for-CVE-2020-28948-CVE-2020-28949",
"owner": {
"login": "JinHao-L",
"id": 52820430,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52820430?v=4",
"html_url": "https:\/\/github.com\/JinHao-L"
},
"html_url": "https:\/\/github.com\/JinHao-L\/PoC-for-CVE-2020-28948-CVE-2020-28949",
"description": null,
"fork": false,
"created_at": "2022-10-03T10:10:11Z",
"updated_at": "2022-10-03T10:19:11Z",
"pushed_at": "2022-10-17T13:56:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2023-06-07T07:43:13Z",
"updated_at": "2023-06-08T08:22:31Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 438,
"watchers_count": 438,
"stargazers_count": 439,
"watchers_count": 439,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -56,7 +56,7 @@
],
"visibility": "public",
"forks": 146,
"watchers": 438,
"watchers": 439,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2023-06-02T15:24:44Z",
"updated_at": "2023-06-08T07:29:40Z",
"pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 231,
"watchers_count": 231,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -143,7 +143,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 230,
"watchers": 231,
"score": 0
},
{
@ -458,10 +458,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
"updated_at": "2023-06-02T15:24:44Z",
"updated_at": "2023-06-08T10:32:40Z",
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -477,7 +477,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 177,
"watchers": 178,
"score": 0
},
{

View file

@ -134,7 +134,7 @@
"stargazers_count": 1035,
"watchers_count": 1035,
"has_discussions": false,
"forks_count": 324,
"forks_count": 325,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -144,7 +144,7 @@
"poc"
],
"visibility": "public",
"forks": 324,
"forks": 325,
"watchers": 1035,
"score": 0
},

View file

@ -196,10 +196,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2023-06-05T14:51:22Z",
"updated_at": "2023-06-08T08:24:33Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -208,7 +208,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 105,
"watchers": 106,
"score": 0
},
{

View file

@ -316,10 +316,10 @@
"description": "CVE-2021-41773 POC with Docker",
"fork": false,
"created_at": "2021-10-06T02:30:40Z",
"updated_at": "2023-05-29T19:02:12Z",
"updated_at": "2023-06-08T08:10:57Z",
"pushed_at": "2022-10-07T23:37:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -328,7 +328,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -1978,10 +1978,10 @@
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T17:56:25Z",
"updated_at": "2023-06-08T04:56:21Z",
"updated_at": "2023-06-08T08:02:30Z",
"pushed_at": "2021-10-26T18:04:43Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1990,7 +1990,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -696,5 +696,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 650990250,
"name": "cve-2021-42013-httpd",
"full_name": "cybfar\/cve-2021-42013-httpd",
"owner": {
"login": "cybfar",
"id": 96472592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96472592?v=4",
"html_url": "https:\/\/github.com\/cybfar"
},
"html_url": "https:\/\/github.com\/cybfar\/cve-2021-42013-httpd",
"description": "CVE: 2021-42013 Tested on: 2.4.49 and 2.4.50 Description: Path Traversal or Remote Code Execution vulnerabilities in Apache 2.4.49 and 2.4.50",
"fork": false,
"created_at": "2023-06-08T08:49:15Z",
"updated_at": "2023-06-08T08:52:32Z",
"pushed_at": "2023-06-08T09:34:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "NoPacScan is a CVE-2021-42287\/CVE-2021-42278 Scanner,it scan for more domain controllers than other script",
"fork": false,
"created_at": "2022-01-07T11:59:55Z",
"updated_at": "2023-04-14T08:56:02Z",
"updated_at": "2023-06-08T06:45:35Z",
"pushed_at": "2022-02-17T04:12:08Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

View file

@ -56,5 +56,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 650974335,
"name": "CVE-2021-43617",
"full_name": "Sybelle03\/CVE-2021-43617",
"owner": {
"login": "Sybelle03",
"id": 107751839,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107751839?v=4",
"html_url": "https:\/\/github.com\/Sybelle03"
},
"html_url": "https:\/\/github.com\/Sybelle03\/CVE-2021-43617",
"description": "This is a reproduction of PHP Laravel 8.70.1 - Cross Site Scripting (XSS) to Cross Site Request Forgery (CSRF) vulnerability",
"fork": false,
"created_at": "2023-06-08T08:05:36Z",
"updated_at": "2023-06-08T08:35:51Z",
"pushed_at": "2023-06-08T08:38:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -363,7 +363,7 @@
"stargazers_count": 1062,
"watchers_count": 1062,
"has_discussions": false,
"forks_count": 501,
"forks_count": 502,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -371,7 +371,7 @@
"log4shell"
],
"visibility": "public",
"forks": 501,
"forks": 502,
"watchers": 1062,
"score": 0
},
@ -880,10 +880,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-06-07T02:10:59Z",
"updated_at": "2023-06-08T12:16:42Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1592,
"watchers_count": 1592,
"stargazers_count": 1593,
"watchers_count": 1593,
"has_discussions": false,
"forks_count": 467,
"allow_forking": true,
@ -897,7 +897,7 @@
],
"visibility": "public",
"forks": 467,
"watchers": 1592,
"watchers": 1593,
"score": 0
},
{
@ -3589,10 +3589,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-06-07T22:03:11Z",
"updated_at": "2023-06-08T11:32:26Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3253,
"watchers_count": 3253,
"stargazers_count": 3254,
"watchers_count": 3254,
"has_discussions": true,
"forks_count": 744,
"allow_forking": true,
@ -3601,7 +3601,7 @@
"topics": [],
"visibility": "public",
"forks": 744,
"watchers": 3253,
"watchers": 3254,
"score": 0
},
{

View file

@ -1175,10 +1175,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-06-07T20:53:37Z",
"updated_at": "2023-06-08T06:45:00Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 415,
"watchers_count": 415,
"stargazers_count": 416,
"watchers_count": 416,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -1187,7 +1187,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
"watchers": 415,
"watchers": 416,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2023-06-05T02:58:03Z",
"updated_at": "2023-06-08T07:48:35Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 142,
"forks": 20,
"watchers": 143,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2023-06-07T05:15:30Z",
"updated_at": "2023-06-08T09:09:53Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 706,
"watchers_count": 706,
"stargazers_count": 707,
"watchers_count": 707,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 155,
"watchers": 706,
"watchers": 707,
"score": 0
}
]

View file

@ -586,10 +586,10 @@
"description": "CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.",
"fork": false,
"created_at": "2023-03-18T11:43:00Z",
"updated_at": "2023-05-23T08:05:35Z",
"updated_at": "2023-06-08T08:51:28Z",
"pushed_at": "2023-03-18T11:47:55Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -598,7 +598,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2023-06-08T00:35:18Z",
"updated_at": "2023-06-08T10:38:53Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 538,
"watchers_count": 538,
"stargazers_count": 539,
"watchers_count": 539,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 538,
"watchers": 539,
"score": 0
},
{

View file

@ -221,7 +221,7 @@
"fork": false,
"created_at": "2023-05-02T08:48:35Z",
"updated_at": "2023-06-01T07:45:43Z",
"pushed_at": "2023-05-25T08:40:25Z",
"pushed_at": "2023-06-08T09:30:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -311,10 +311,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2023-06-07T11:46:30Z",
"updated_at": "2023-06-08T06:44:24Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -323,7 +323,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 330,
"watchers": 331,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
"updated_at": "2023-06-08T05:29:55Z",
"updated_at": "2023-06-08T06:54:04Z",
"pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 231,
"watchers": 232,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-06-02T15:25:04Z",
"updated_at": "2023-06-08T08:30:22Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 807,
"watchers_count": 807,
"stargazers_count": 806,
"watchers_count": 806,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 807,
"watchers": 806,
"score": 0
},
{

31
2023/CVE-2023-10608.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 651022706,
"name": "cve-2023-10608-PoC",
"full_name": "b35363\/cve-2023-10608-PoC",
"owner": {
"login": "b35363",
"id": 120607606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120607606?v=4",
"html_url": "https:\/\/github.com\/b35363"
},
"html_url": "https:\/\/github.com\/b35363\/cve-2023-10608-PoC",
"description": "cve-2023-10608 Proof Of Concept",
"fork": false,
"created_at": "2023-06-08T10:16:41Z",
"updated_at": "2023-06-08T10:31:49Z",
"pushed_at": "2023-06-08T10:32:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -90,5 +90,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 651069957,
"name": "CVE-2023-2033",
"full_name": "WalccDev\/CVE-2023-2033",
"owner": {
"login": "WalccDev",
"id": 135978726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135978726?v=4",
"html_url": "https:\/\/github.com\/WalccDev"
},
"html_url": "https:\/\/github.com\/WalccDev\/CVE-2023-2033",
"description": "cve-2023-2033 exploit",
"fork": false,
"created_at": "2023-06-08T12:29:08Z",
"updated_at": "2023-06-08T12:33:41Z",
"pushed_at": "2023-06-08T12:35:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -49,10 +49,10 @@
"description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036",
"fork": false,
"created_at": "2023-03-22T14:59:42Z",
"updated_at": "2023-06-03T13:33:41Z",
"updated_at": "2023-06-08T09:23:10Z",
"pushed_at": "2023-05-15T12:12:33Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 67,
"watchers": 68,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
"fork": false,
"created_at": "2023-05-11T07:37:52Z",
"updated_at": "2023-06-07T15:20:53Z",
"updated_at": "2023-06-08T09:32:52Z",
"pushed_at": "2023-06-02T02:52:35Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 142,
"watchers": 143,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
"fork": false,
"created_at": "2023-06-06T14:05:09Z",
"updated_at": "2023-06-08T05:53:25Z",
"pushed_at": "2023-06-07T19:38:16Z",
"stargazers_count": 65,
"watchers_count": 65,
"updated_at": "2023-06-08T12:38:59Z",
"pushed_at": "2023-06-08T09:05:21Z",
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 16,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 65,
"forks": 18,
"watchers": 72,
"score": 0
}
]

View file

@ -46,12 +46,12 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-06-05T18:15:06Z",
"updated_at": "2023-06-08T08:29:20Z",
"pushed_at": "2023-06-03T19:35:51Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -65,8 +65,8 @@
"poc"
],
"visibility": "public",
"forks": 18,
"watchers": 106,
"forks": 19,
"watchers": 107,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
"fork": false,
"created_at": "2023-04-22T21:34:06Z",
"updated_at": "2023-05-25T15:30:46Z",
"updated_at": "2023-06-08T11:48:14Z",
"pushed_at": "2023-05-01T19:31:20Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"gitlab"
],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 120,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2023-28771 based on Rapid7's excellent writeup",
"fork": false,
"created_at": "2023-05-23T02:37:39Z",
"updated_at": "2023-06-07T01:38:26Z",
"updated_at": "2023-06-08T11:03:36Z",
"pushed_at": "2023-05-23T02:49:05Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -44,10 +44,10 @@
"description": "The script is designed to facilitate testing and exploration of the IKEv2 protocol in vulnerable devices, based on Rapid7's exploitation techniques.",
"fork": false,
"created_at": "2023-06-03T15:40:50Z",
"updated_at": "2023-06-07T01:35:35Z",
"updated_at": "2023-06-08T11:03:38Z",
"pushed_at": "2023-06-03T15:45:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -56,7 +56,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-03T14:13:48Z",
"updated_at": "2023-06-07T05:32:38Z",
"updated_at": "2023-06-08T09:38:33Z",
"pushed_at": "2023-06-03T14:15:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -47,13 +47,13 @@
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 56,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 56,
"forks": 57,
"watchers": 236,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-05-30T02:18:29Z",
"updated_at": "2023-06-07T07:18:40Z",
"updated_at": "2023-06-08T07:42:44Z",
"pushed_at": "2023-05-30T02:43:06Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -47,10 +47,10 @@
"description": "SCM Manager XSS",
"fork": false,
"created_at": "2023-06-07T04:20:54Z",
"updated_at": "2023-06-07T04:22:39Z",
"updated_at": "2023-06-08T11:31:10Z",
"pushed_at": "2023-06-07T04:21:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

31
2023/CVE-2023-51504.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 650964426,
"name": "CVE-2023-51504",
"full_name": "Sybelle03\/CVE-2023-51504",
"owner": {
"login": "Sybelle03",
"id": 107751839,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107751839?v=4",
"html_url": "https:\/\/github.com\/Sybelle03"
},
"html_url": "https:\/\/github.com\/Sybelle03\/CVE-2023-51504",
"description": "This is a dockerized reproduction of the MotoCMS SQL injection (cf exploit db) ",
"fork": false,
"created_at": "2023-06-08T07:37:08Z",
"updated_at": "2023-06-08T08:01:23Z",
"pushed_at": "2023-06-08T08:45:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -221,6 +221,7 @@ Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote a
- [insoxin/CVE-2023-2033](https://github.com/insoxin/CVE-2023-2033)
- [sandumjacob/CVE-2023-2033-Analysis](https://github.com/sandumjacob/CVE-2023-2033-Analysis)
- [gretchenfrage/CVE-2023-2033-analysis](https://github.com/gretchenfrage/CVE-2023-2033-analysis)
- [WalccDev/CVE-2023-2033](https://github.com/WalccDev/CVE-2023-2033)
### CVE-2023-2114 (2023-05-08)
@ -313,6 +314,9 @@ Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampas
- [mnqazi/CVE-2023-3009](https://github.com/mnqazi/CVE-2023-3009)
### CVE-2023-10608
- [b35363/cve-2023-10608-PoC](https://github.com/b35363/cve-2023-10608-PoC)
### CVE-2023-20052 (2023-03-01)
<code>
@ -1675,6 +1679,9 @@ In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.
- [deepinstinct/MOVEit_CVE-2023-34362_IOCs](https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs)
- [hheeyywweellccoommee/CVE-2023-34362-nhjxn](https://github.com/hheeyywweellccoommee/CVE-2023-34362-nhjxn)
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
## 2022
### CVE-2022-0185 (2022-02-11)
@ -13336,6 +13343,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- [mightysai1997/cve-2021-42013L](https://github.com/mightysai1997/cve-2021-42013L)
- [mightysai1997/cve-2021-42013.get](https://github.com/mightysai1997/cve-2021-42013.get)
- [12345qwert123456/CVE-2021-42013](https://github.com/12345qwert123456/CVE-2021-42013)
- [cybfar/cve-2021-42013-httpd](https://github.com/cybfar/cve-2021-42013-httpd)
### CVE-2021-42056 (2022-06-24)
@ -13813,6 +13821,7 @@ Laravel Framework through 8.70.2 does not sufficiently block the upload of execu
- [kombat1/CVE-2021-43617](https://github.com/kombat1/CVE-2021-43617)
- [aweiiy/CVE-2021-43617](https://github.com/aweiiy/CVE-2021-43617)
- [Sybelle03/CVE-2021-43617](https://github.com/Sybelle03/CVE-2021-43617)
### CVE-2021-43657 (2022-12-21)
@ -14989,6 +14998,14 @@ In updateUidProcState of AppOpsService.java, there is a possible permission bypa
- [mooneee/CVE-2020-0121](https://github.com/mooneee/CVE-2020-0121)
### CVE-2020-0136 (2020-06-11)
<code>
In multiple locations of Parcel.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-120078455
</code>
- [Satheesh575555/libhwbinder_AOSP10_r33_CVE-2020-0136](https://github.com/Satheesh575555/libhwbinder_AOSP10_r33_CVE-2020-0136)
### CVE-2020-0137 (2020-06-11)
<code>
@ -15973,6 +15990,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [Neko-chanQwQ/CVE-2020-1938](https://github.com/Neko-chanQwQ/CVE-2020-1938)
- [jptr218/ghostcat](https://github.com/jptr218/ghostcat)
- [einzbernnn/CVE-2020-1938Scan](https://github.com/einzbernnn/CVE-2020-1938Scan)
- [YounesTasra-R4z3rSw0rd/CVE-2020-1938](https://github.com/YounesTasra-R4z3rSw0rd/CVE-2020-1938)
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
### CVE-2020-1947 (2020-03-11)
@ -19754,6 +19772,14 @@ Cross Site Scripting (XSS) in Configuration page in SKYWORTH GN542VF Hardware Ve
- [swzhouu/CVE-2020-26733](https://github.com/swzhouu/CVE-2020-26733)
### CVE-2020-26878 (2020-10-26)
<code>
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
</code>
- [htarsoo/CVE-2020-26878](https://github.com/htarsoo/CVE-2020-26878)
### CVE-2020-27190
- [qlh831/x-CVE-2020-27190](https://github.com/qlh831/x-CVE-2020-27190)
@ -19839,6 +19865,7 @@ A flaw was found in the Linux kernels implementation of MIDI, where an attack
- [kiks7/CVE-2020-27786-Kernel-Exploit](https://github.com/kiks7/CVE-2020-27786-Kernel-Exploit)
- [elbiazo/CVE-2020-27786](https://github.com/elbiazo/CVE-2020-27786)
- [Trinadh465/linux-4.19.72_CVE-2020-27786](https://github.com/Trinadh465/linux-4.19.72_CVE-2020-27786)
### CVE-2020-27824 (2021-05-13)
@ -20077,6 +20104,7 @@ Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blo
- [0x240x23elu/CVE-2020-28948-and-CVE-2020-28949](https://github.com/0x240x23elu/CVE-2020-28948-and-CVE-2020-28949)
- [nopdata/cve-2020-28948](https://github.com/nopdata/cve-2020-28948)
- [JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949](https://github.com/JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949)
### CVE-2020-29007 (2023-04-15)
@ -21414,6 +21442,7 @@ SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to dest
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
</code>
- [jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-](https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-)
- [rabbitmask/CVE-2019-5475-EXP](https://github.com/rabbitmask/CVE-2019-5475-EXP)
- [EXP-Docs/CVE-2019-5475](https://github.com/EXP-Docs/CVE-2019-5475)
@ -23518,6 +23547,7 @@ An issue was discovered in Webmin &lt;=1.920. The parameter old in password_chan
- [HACHp1/webmin_docker_and_exp](https://github.com/HACHp1/webmin_docker_and_exp)
- [ketlerd/CVE-2019-15107](https://github.com/ketlerd/CVE-2019-15107)
- [AdministratorGithub/CVE-2019-15107](https://github.com/AdministratorGithub/CVE-2019-15107)
- [Rayferrufino/Make-and-Break](https://github.com/Rayferrufino/Make-and-Break)
- [AleWong/WebminRCE-EXP-CVE-2019-15107-](https://github.com/AleWong/WebminRCE-EXP-CVE-2019-15107-)
- [ianxtianxt/CVE-2019-15107](https://github.com/ianxtianxt/CVE-2019-15107)
- [Pichuuuuu/verbose_happiness](https://github.com/Pichuuuuu/verbose_happiness)
@ -28489,7 +28519,6 @@ Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java
</code>
- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
- [scopion/CVE-2017-3241](https://github.com/scopion/CVE-2017-3241)
### CVE-2017-3248 (2017-01-27)
@ -32580,7 +32609,6 @@ The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses
Directory traversal vulnerability in Pivotal Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.
</code>
- [ilmila/springcss-cve-2014-3625](https://github.com/ilmila/springcss-cve-2014-3625)
- [gforresu/SpringPathTraversal](https://github.com/gforresu/SpringPathTraversal)
### CVE-2014-3704 (2014-10-15)
@ -32645,7 +32673,6 @@ drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used i
- [retme7/CVE-2014-4322_poc](https://github.com/retme7/CVE-2014-4322_poc)
- [laginimaineb/cve-2014-4322](https://github.com/laginimaineb/cve-2014-4322)
- [askk/CVE-2014-4322_adaptation](https://github.com/askk/CVE-2014-4322_adaptation)
- [koozxcv/CVE-2014-4322](https://github.com/koozxcv/CVE-2014-4322)
### CVE-2014-4323 (2014-12-12)