Auto Update 2023/11/04 12:25:10

This commit is contained in:
motikan2010-bot 2023-11-04 21:25:10 +09:00
parent b0f9273917
commit cc4f4c628d
18 changed files with 1060 additions and 955 deletions

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2023-11-03T11:10:37Z",
"updated_at": "2023-11-04T10:45:18Z",
"pushed_at": "2023-01-22T09:39:45Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 373,
"watchers_count": 373,
"has_discussions": false,
"forks_count": 119,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 119,
"watchers": 372,
"watchers": 373,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2023-10-23T21:45:09Z",
"updated_at": "2023-11-04T08:26:25Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 3
},

View file

@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2023-11-03T10:55:17Z",
"updated_at": "2023-11-04T11:02:50Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1088,
"watchers_count": 1088,
"stargazers_count": 1089,
"watchers_count": 1089,
"has_discussions": false,
"forks_count": 284,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 284,
"watchers": 1088,
"watchers": 1089,
"score": 0,
"subscribers_count": 35
},

View file

@ -191,35 +191,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 492747547,
"name": "CVE-2021-21315-ENV",
"full_name": "H3rmesk1t\/CVE-2021-21315-ENV",
"owner": {
"login": "H3rmesk1t",
"id": 70096788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70096788?v=4",
"html_url": "https:\/\/github.com\/H3rmesk1t"
},
"html_url": "https:\/\/github.com\/H3rmesk1t\/CVE-2021-21315-ENV",
"description": "CVE-2021-21315-ENV",
"fork": false,
"created_at": "2022-05-16T08:30:31Z",
"updated_at": "2023-02-27T00:46:07Z",
"pushed_at": "2022-05-16T08:31:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

32
2021/CVE-2021-21716.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 714215346,
"name": "CVE-2023-21716-EXPLOIT.py",
"full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py",
"owner": {
"login": "MojithaR",
"id": 127576267,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4",
"html_url": "https:\/\/github.com\/MojithaR"
},
"html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py",
"description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability",
"fork": false,
"created_at": "2023-11-04T08:49:14Z",
"updated_at": "2023-11-04T08:52:03Z",
"pushed_at": "2023-11-04T08:52:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2021/CVE-2021-36393.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 714260511,
"name": "CVE-2021-36393-Exploit",
"full_name": "T0X1Cx\/CVE-2021-36393-Exploit",
"owner": {
"login": "T0X1Cx",
"id": 71453093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4",
"html_url": "https:\/\/github.com\/T0X1Cx"
},
"html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2021-36393-Exploit",
"description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.",
"fork": false,
"created_at": "2023-11-04T11:45:55Z",
"updated_at": "2023-11-04T11:46:56Z",
"pushed_at": "2023-11-04T11:52:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2023-10-08T08:18:58Z",
"updated_at": "2023-11-04T06:56:49Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 492,
"watchers_count": 492,
"stargazers_count": 491,
"watchers_count": 491,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 492,
"watchers": 491,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-11-03T07:16:11Z",
"updated_at": "2023-11-04T08:26:50Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1061,
"watchers_count": 1061,
"stargazers_count": 1062,
"watchers_count": 1062,
"has_discussions": true,
"forks_count": 181,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 181,
"watchers": 1061,
"watchers": 1062,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "Attacks against QUIC (CVE-2022-30591)",
"fork": false,
"created_at": "2022-06-30T18:25:23Z",
"updated_at": "2023-10-01T10:56:27Z",
"updated_at": "2023-11-04T08:00:24Z",
"pushed_at": "2022-12-31T01:55:15Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-10-28T05:09:56Z",
"updated_at": "2023-11-04T09:10:09Z",
"pushed_at": "2023-10-14T08:02:40Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": true,
"forks_count": 19,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 110,
"watchers": 111,
"score": 0,
"subscribers_count": 6
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2

View file

@ -73,7 +73,7 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-11-01T12:10:53Z",
"updated_at": "2023-11-04T11:32:22Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 845,
"watchers_count": 845,
@ -228,10 +228,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-05T21:50:25Z",
"updated_at": "2023-10-29T10:33:12Z",
"updated_at": "2023-11-04T11:32:10Z",
"pushed_at": "2023-06-13T08:55:50Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -242,7 +242,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 136,
"watchers": 135,
"score": 0,
"subscribers_count": 12
},

View file

@ -238,5 +238,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 714215346,
"name": "CVE-2023-21716-EXPLOIT.py",
"full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py",
"owner": {
"login": "MojithaR",
"id": 127576267,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4",
"html_url": "https:\/\/github.com\/MojithaR"
},
"html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py",
"description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability",
"fork": false,
"created_at": "2023-11-04T08:49:14Z",
"updated_at": "2023-11-04T08:52:03Z",
"pushed_at": "2023-11-04T08:52:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -424,10 +424,10 @@
"description": "CVE-2023-22515",
"fork": false,
"created_at": "2023-10-30T00:17:45Z",
"updated_at": "2023-11-03T17:10:12Z",
"updated_at": "2023-11-04T09:30:50Z",
"pushed_at": "2023-10-31T09:58:17Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -436,7 +436,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2023-11-04T02:11:15Z",
"updated_at": "2023-11-04T12:16:39Z",
"pushed_at": "2023-11-03T12:50:06Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 2
},
@ -73,7 +73,7 @@
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
"fork": false,
"created_at": "2023-11-03T22:06:09Z",
"updated_at": "2023-11-04T04:33:52Z",
"updated_at": "2023-11-04T07:15:40Z",
"pushed_at": "2023-11-03T22:37:16Z",
"stargazers_count": 2,
"watchers_count": 2,
@ -88,5 +88,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 714263844,
"name": "CVE-2023-46604",
"full_name": "evkl1d\/CVE-2023-46604",
"owner": {
"login": "evkl1d",
"id": 113887123,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113887123?v=4",
"html_url": "https:\/\/github.com\/evkl1d"
},
"html_url": "https:\/\/github.com\/evkl1d\/CVE-2023-46604",
"description": null,
"fork": false,
"created_at": "2023-11-04T11:58:21Z",
"updated_at": "2023-11-04T12:00:25Z",
"pushed_at": "2023-11-04T12:08:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "exploit for cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2023-11-04T01:14:44Z",
"updated_at": "2023-11-04T06:43:22Z",
"pushed_at": "2023-11-03T11:47:26Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,10 +103,10 @@
"description": "Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360.",
"fork": false,
"created_at": "2023-11-02T03:15:44Z",
"updated_at": "2023-11-02T19:46:52Z",
"updated_at": "2023-11-04T08:06:02Z",
"pushed_at": "2023-11-02T17:57:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -128,7 +128,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

1757
README.md

File diff suppressed because it is too large Load diff