Auto Update 2023/02/04 12:30:23

This commit is contained in:
motikan2010-bot 2023-02-04 21:30:23 +09:00
parent 9c19254d87
commit ce6c282c5a
27 changed files with 202 additions and 181 deletions

31
2014/CVE-2014-6598.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 30013698,
"name": "DRA_writeup",
"full_name": "KPN-CISO\/DRA_writeup",
"owner": {
"login": "KPN-CISO",
"id": 6069290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6069290?v=4",
"html_url": "https:\/\/github.com\/KPN-CISO"
},
"html_url": "https:\/\/github.com\/KPN-CISO\/DRA_writeup",
"description": "Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598",
"fork": false,
"created_at": "2015-01-29T09:43:23Z",
"updated_at": "2022-06-20T17:15:49Z",
"pushed_at": "2015-01-29T10:02:00Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 14,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-03T06:24:51Z",
"updated_at": "2023-02-04T07:27:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1603,
"watchers_count": 1603,
"stargazers_count": 1604,
"watchers_count": 1604,
"has_discussions": false,
"forks_count": 317,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 317,
"watchers": 1603,
"watchers": 1604,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2023-01-19T11:38:19Z",
"updated_at": "2023-02-04T08:01:15Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 916,
"watchers_count": 916,
"stargazers_count": 917,
"watchers_count": 917,
"has_discussions": false,
"forks_count": 408,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 408,
"watchers": 916,
"watchers": 917,
"score": 0
},
{
@ -288,10 +288,10 @@
"description": "Universal Android root tool based on CVE-2016-5195. Watch this space.",
"fork": false,
"created_at": "2016-10-24T12:35:55Z",
"updated_at": "2023-01-28T13:46:09Z",
"updated_at": "2023-02-04T08:14:51Z",
"pushed_at": "2016-10-29T13:42:39Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -300,7 +300,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-03T06:24:51Z",
"updated_at": "2023-02-04T07:27:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1603,
"watchers_count": 1603,
"stargazers_count": 1604,
"watchers_count": 1604,
"has_discussions": false,
"forks_count": 317,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 317,
"watchers": 1603,
"watchers": 1604,
"score": 0
},
{

View file

@ -193,17 +193,17 @@
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2023-01-23T07:22:38Z",
"pushed_at": "2017-04-05T23:29:03Z",
"pushed_at": "2023-02-04T09:09:35Z",
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 55,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 55,
"forks": 56,
"watchers": 59,
"score": 0
},

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-03T06:24:51Z",
"updated_at": "2023-02-04T07:27:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1603,
"watchers_count": 1603,
"stargazers_count": 1604,
"watchers_count": 1604,
"has_discussions": false,
"forks_count": 317,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 317,
"watchers": 1603,
"watchers": 1604,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-02-02T07:58:56Z",
"updated_at": "2023-02-04T09:42:33Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3665,
"watchers_count": 3665,
"stargazers_count": 3666,
"watchers_count": 3666,
"has_discussions": false,
"forks_count": 1053,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1053,
"watchers": 3665,
"watchers": 3666,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-03T06:24:51Z",
"updated_at": "2023-02-04T07:27:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1603,
"watchers_count": 1603,
"stargazers_count": 1604,
"watchers_count": 1604,
"has_discussions": false,
"forks_count": 317,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 317,
"watchers": 1603,
"watchers": 1604,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2023-01-06T16:49:58Z",
"updated_at": "2023-02-04T08:17:51Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 199,
"watchers_count": 199,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 199,
"watchers": 200,
"score": 0
},
{

View file

@ -105,7 +105,7 @@
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 206,
"forks_count": 207,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -113,7 +113,7 @@
"cve-2020-0796"
],
"visibility": "public",
"forks": 206,
"forks": 207,
"watchers": 630,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-02-02T07:58:56Z",
"updated_at": "2023-02-04T09:42:33Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3665,
"watchers_count": 3665,
"stargazers_count": 3666,
"watchers_count": 3666,
"has_discussions": false,
"forks_count": 1053,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1053,
"watchers": 3665,
"watchers": 3666,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-03T06:24:51Z",
"updated_at": "2023-02-04T07:27:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1603,
"watchers_count": 1603,
"stargazers_count": 1604,
"watchers_count": 1604,
"has_discussions": false,
"forks_count": 317,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 317,
"watchers": 1603,
"watchers": 1604,
"score": 0
},
{

View file

@ -77,10 +77,10 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2022-10-19T14:34:52Z",
"updated_at": "2023-02-04T08:46:10Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 371,
"watchers_count": 371,
"stargazers_count": 372,
"watchers_count": 372,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 371,
"watchers": 372,
"score": 0
},
{
@ -1161,12 +1161,12 @@
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
"fork": false,
"created_at": "2020-07-10T15:33:00Z",
"updated_at": "2022-11-09T18:08:29Z",
"updated_at": "2023-02-04T08:45:11Z",
"pushed_at": "2020-07-12T10:36:20Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1178,8 +1178,8 @@
"tmui"
],
"visibility": "public",
"forks": 16,
"watchers": 60,
"forks": 17,
"watchers": 61,
"score": 0
},
{

View file

@ -76,13 +76,13 @@
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 37,
"watchers": 214,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
"fork": false,
"created_at": "2021-05-25T17:14:38Z",
"updated_at": "2023-02-04T02:34:47Z",
"updated_at": "2023-02-04T09:24:55Z",
"pushed_at": "2021-07-09T19:38:41Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 95,
"watchers": 96,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 587390406,
"name": "CVE-2022-21839-",
"full_name": "lolin19\/CVE-2022-21839-",
"owner": {
"login": "lolin19",
"id": 104766804,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104766804?v=4",
"html_url": "https:\/\/github.com\/lolin19"
},
"html_url": "https:\/\/github.com\/lolin19\/CVE-2022-21839-",
"description": null,
"fork": false,
"created_at": "2023-01-10T16:34:02Z",
"updated_at": "2023-01-10T16:34:02Z",
"pushed_at": "2023-01-10T16:42:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -43,17 +43,17 @@
"fork": false,
"created_at": "2023-01-16T02:35:54Z",
"updated_at": "2023-01-30T23:00:33Z",
"pushed_at": "2023-01-16T02:49:05Z",
"pushed_at": "2023-02-04T10:16:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,7 +13,7 @@
"description": "Unquoted Service Path privilege escalation vulnerability in Sherpa Connector Service. ",
"fork": false,
"created_at": "2022-04-06T16:18:32Z",
"updated_at": "2022-07-21T13:57:05Z",
"updated_at": "2023-02-04T11:19:38Z",
"pushed_at": "2022-04-06T16:34:51Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -1934,5 +1934,34 @@
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 597319077,
"name": "CVE-2022-26134_Behinder_MemShell",
"full_name": "MaskCyberSecurityTeam\/CVE-2022-26134_Behinder_MemShell",
"owner": {
"login": "MaskCyberSecurityTeam",
"id": 107802263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107802263?v=4",
"html_url": "https:\/\/github.com\/MaskCyberSecurityTeam"
},
"html_url": "https:\/\/github.com\/MaskCyberSecurityTeam\/CVE-2022-26134_Behinder_MemShell",
"description": null,
"fork": false,
"created_at": "2023-02-04T06:51:47Z",
"updated_at": "2023-02-04T07:17:43Z",
"pushed_at": "2023-02-04T07:18:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-02-04T06:23:14Z",
"updated_at": "2023-02-04T12:08:30Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 118,
"watchers": 132,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "The vulnerable recurrence docker environment for CVE-2022-44268",
"fork": false,
"created_at": "2023-02-03T08:02:28Z",
"updated_at": "2023-02-03T16:51:12Z",
"updated_at": "2023-02-04T11:15:10Z",
"pushed_at": "2023-02-03T08:03:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -146,5 +146,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 597372793,
"name": "CVE-2022-44268-PoC",
"full_name": "Baikuya\/CVE-2022-44268-PoC",
"owner": {
"login": "Baikuya",
"id": 52155445,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52155445?v=4",
"html_url": "https:\/\/github.com\/Baikuya"
},
"html_url": "https:\/\/github.com\/Baikuya\/CVE-2022-44268-PoC",
"description": "CVE-2022-44268 PoC",
"fork": false,
"created_at": "2023-02-04T10:50:20Z",
"updated_at": "2023-02-04T10:50:20Z",
"pushed_at": "2023-02-04T11:01:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 585004232,
"name": "CVE-2022-46164-poc",
"full_name": "stephenbradshaw\/CVE-2022-46164-poc",
"owner": {
"login": "stephenbradshaw",
"id": 7692557,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7692557?v=4",
"html_url": "https:\/\/github.com\/stephenbradshaw"
},
"html_url": "https:\/\/github.com\/stephenbradshaw\/CVE-2022-46164-poc",
"description": "Basic POC exploit for CVE-2022-46164",
"fork": false,
"created_at": "2023-01-04T04:17:30Z",
"updated_at": "2023-02-02T10:16:21Z",
"pushed_at": "2023-01-11T07:16:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-02-04T00:48:55Z",
"updated_at": "2023-02-04T08:17:19Z",
"pushed_at": "2023-01-30T10:51:18Z",
"stargazers_count": 676,
"watchers_count": 676,
"stargazers_count": 678,
"watchers_count": 678,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 676,
"watchers": 678,
"score": 0
},
{
@ -320,10 +320,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-26T19:52:30Z",
"updated_at": "2023-02-04T03:20:16Z",
"updated_at": "2023-02-04T08:16:04Z",
"pushed_at": "2023-02-01T20:26:41Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -332,7 +332,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 60,
"watchers": 63,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-02-03T21:51:04Z",
"updated_at": "2023-02-04T05:22:40Z",
"updated_at": "2023-02-04T12:18:09Z",
"pushed_at": "2023-02-03T22:22:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 7,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-01-21T01:02:01Z",
"updated_at": "2023-02-04T03:26:45Z",
"updated_at": "2023-02-04T11:12:13Z",
"pushed_at": "2023-02-03T01:40:35Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 70,
"forks": 14,
"watchers": 74,
"score": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-01-30T12:57:48Z",
"updated_at": "2023-02-04T05:48:44Z",
"updated_at": "2023-02-04T11:36:02Z",
"pushed_at": "2023-02-03T03:07:59Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 15,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,8 +34,8 @@
"use-after-free"
],
"visibility": "public",
"forks": 15,
"watchers": 72,
"forks": 17,
"watchers": 80,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
"fork": false,
"created_at": "2023-01-25T03:21:42Z",
"updated_at": "2023-02-04T02:51:44Z",
"updated_at": "2023-02-04T10:23:59Z",
"pushed_at": "2023-01-25T06:29:15Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 194,
"watchers_count": 194,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 193,
"watchers": 194,
"score": 0
},
{

View file

@ -1222,14 +1222,6 @@ In audio ipi, there is a possible memory corruption due to a race condition. Thi
- [docfate111/CVE-2022-21789](https://github.com/docfate111/CVE-2022-21789)
### CVE-2022-21839 (2022-01-11)
<code>
Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability.
</code>
- [lolin19/CVE-2022-21839-](https://github.com/lolin19/CVE-2022-21839-)
### CVE-2022-21877 (2022-01-11)
<code>
@ -2553,6 +2545,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [badboy-sft/CVE-2022-26134](https://github.com/badboy-sft/CVE-2022-26134)
- [wjlin0/CVE-2022-26134](https://github.com/wjlin0/CVE-2022-26134)
- [cbk914/CVE-2022-26134_check](https://github.com/cbk914/CVE-2022-26134_check)
- [MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell](https://github.com/MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell)
### CVE-2022-26135 (2022-06-30)
@ -5223,6 +5216,7 @@ Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWif
- [agathanon/cve-2022-44268](https://github.com/agathanon/cve-2022-44268)
- [jnschaeffer/cve-2022-44268-detector](https://github.com/jnschaeffer/cve-2022-44268-detector)
- [Ashifcoder/CVE-2022-44268-automated-poc](https://github.com/Ashifcoder/CVE-2022-44268-automated-poc)
- [Baikuya/CVE-2022-44268-PoC](https://github.com/Baikuya/CVE-2022-44268-PoC)
### CVE-2022-44311 (2022-11-08)
@ -5376,14 +5370,6 @@ An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in
### CVE-2022-46104
- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
### CVE-2022-46164 (2022-12-05)
<code>
NodeBB is an open source Node.js based forum software. Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. This vulnerability has been patched in version 2.6.1. Users are advised to upgrade. Users unable to upgrade may cherry-pick commit `48d143921753914da45926cca6370a92ed0c46b8` into their codebase to patch the exploit.
</code>
- [stephenbradshaw/CVE-2022-46164-poc](https://github.com/stephenbradshaw/CVE-2022-46164-poc)
### CVE-2022-46169 (2022-12-05)
<code>
@ -29877,6 +29863,14 @@ Unspecified vulnerability in the XML Developer's Kit for C component in Oracle D
- [SecurityArtWork/oracle-xxe-sqli](https://github.com/SecurityArtWork/oracle-xxe-sqli)
### CVE-2014-6598 (2015-01-21)
<code>
Unspecified vulnerability in the Oracle Communications Diameter Signaling Router component in Oracle Communications Applications 3.x, 4.x, and 5.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Signaling - DPI.
</code>
- [KPN-CISO/DRA_writeup](https://github.com/KPN-CISO/DRA_writeup)
### CVE-2014-7169 (2014-09-24)
<code>