Auto Update 2024/01/22 12:54:56

This commit is contained in:
motikan2010-bot 2024-01-22 21:54:56 +09:00
parent f5a396ccc1
commit cf4568a22d
45 changed files with 260 additions and 393 deletions

View file

@ -28,35 +28,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 323575291,
"name": "CVE-2017-11610",
"full_name": "yaunsky\/CVE-2017-11610",
"owner": {
"login": "yaunsky",
"id": 48243087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
"html_url": "https:\/\/github.com\/yaunsky"
},
"html_url": "https:\/\/github.com\/yaunsky\/CVE-2017-11610",
"description": "Supervisord远程命令执行漏洞脚本",
"fork": false,
"created_at": "2020-12-22T09:08:49Z",
"updated_at": "2022-03-20T05:21:38Z",
"pushed_at": "2020-12-22T09:12:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -636,36 +636,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 202340795,
"name": "CVE-2017-11882",
"full_name": "littlebin404\/CVE-2017-11882",
"owner": {
"login": "littlebin404",
"id": 54022042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54022042?v=4",
"html_url": "https:\/\/github.com\/littlebin404"
},
"html_url": "https:\/\/github.com\/littlebin404\/CVE-2017-11882",
"description": "CVE-2017-11882通杀Office 2003到2016",
"fork": false,
"created_at": "2019-08-14T11:55:00Z",
"updated_at": "2023-09-28T11:05:07Z",
"pushed_at": "2020-12-22T07:23:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 232606684,
"name": "Overflow-Demo-CVE-2017-11882",
@ -786,49 +756,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 332744031,
"name": "SignHere",
"full_name": "Retr0-code\/SignHere",
"owner": {
"login": "Retr0-code",
"id": 60541996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60541996?v=4",
"html_url": "https:\/\/github.com\/Retr0-code"
},
"html_url": "https:\/\/github.com\/Retr0-code\/SignHere",
"description": "SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.",
"fork": false,
"created_at": "2021-01-25T12:44:03Z",
"updated_at": "2023-02-12T18:04:41Z",
"pushed_at": "2021-01-26T16:29:27Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automation",
"build-tool",
"builder",
"cve",
"cve-2017-11882",
"equation",
"malicious",
"microsoft",
"office",
"python3",
"rtf",
"vulnerabilities"
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 431719997,
"name": "CVE-2017-11882-exp",

View file

@ -299,36 +299,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 328929654,
"name": "CVE-2017-12615-EXP",
"full_name": "w0x68y\/CVE-2017-12615-EXP",
"owner": {
"login": "w0x68y",
"id": 22195911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
"html_url": "https:\/\/github.com\/w0x68y"
},
"html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP",
"description": "CVE-2017-12615 任意文件写入exp写入webshell",
"fork": false,
"created_at": "2021-01-12T09:07:12Z",
"updated_at": "2022-10-23T07:40:44Z",
"pushed_at": "2021-01-13T03:23:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 565419626,
"name": "AttackTomcat",

View file

@ -1,32 +0,0 @@
[
{
"id": 327169091,
"name": "CVE-2017-16651",
"full_name": "ropbear\/CVE-2017-16651",
"owner": {
"login": "ropbear",
"id": 11134586,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134586?v=4",
"html_url": "https:\/\/github.com\/ropbear"
},
"html_url": "https:\/\/github.com\/ropbear\/CVE-2017-16651",
"description": "Python implementation of Roundcube LFI (CVE-2017-16651)",
"fork": false,
"created_at": "2021-01-06T01:46:39Z",
"updated_at": "2023-09-24T16:23:48Z",
"pushed_at": "2021-01-06T01:47:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -209,36 +209,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 330894535,
"name": "exploit-nginx-1.10.3",
"full_name": "gemboxteam\/exploit-nginx-1.10.3",
"owner": {
"login": "gemboxteam",
"id": 27276452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27276452?v=4",
"html_url": "https:\/\/github.com\/gemboxteam"
},
"html_url": "https:\/\/github.com\/gemboxteam\/exploit-nginx-1.10.3",
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
"fork": false,
"created_at": "2021-01-19T07:12:10Z",
"updated_at": "2023-12-26T17:34:28Z",
"pushed_at": "2021-01-19T07:17:52Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 331347189,
"name": "Remote-Integer-Overflow-Vulnerability",

View file

@ -59,36 +59,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 312471106,
"name": "cve-2017-7921-golang",
"full_name": "MisakaMikato\/cve-2017-7921-golang",
"owner": {
"login": "MisakaMikato",
"id": 31957147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957147?v=4",
"html_url": "https:\/\/github.com\/MisakaMikato"
},
"html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang",
"description": "Hikvision IP camera access bypass exploit, developed by golang. ",
"fork": false,
"created_at": "2020-11-13T04:15:31Z",
"updated_at": "2023-06-25T06:04:21Z",
"pushed_at": "2021-01-11T05:52:22Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 334195499,
"name": "hikvision_CVE-2017-7921_auth_bypass_config_decryptor",

View file

@ -1,34 +1,4 @@
[
{
"id": 117610085,
"name": "dp_crypto",
"full_name": "bao7uo\/dp_crypto",
"owner": {
"login": "bao7uo",
"id": 21125224,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21125224?v=4",
"html_url": "https:\/\/github.com\/bao7uo"
},
"html_url": "https:\/\/github.com\/bao7uo\/dp_crypto",
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2024-01-14T06:47:28Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 162,
"score": 0,
"subscribers_count": 8
},
{
"id": 143378191,
"name": "Telewreck",

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2024-01-19T21:09:16Z",
"updated_at": "2024-01-22T11:56:55Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 780,
"watchers_count": 780,
"stargazers_count": 781,
"watchers_count": 781,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 780,
"watchers": 781,
"score": 0,
"subscribers_count": 33
}

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-01-22T03:33:50Z",
"updated_at": "2024-01-22T09:28:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3978,
"watchers_count": 3978,
"stargazers_count": 3980,
"watchers_count": 3980,
"has_discussions": false,
"forks_count": 1091,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1091,
"watchers": 3978,
"watchers": 3980,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-01-22T03:33:50Z",
"updated_at": "2024-01-22T09:28:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3978,
"watchers_count": 3978,
"stargazers_count": 3980,
"watchers_count": 3980,
"has_discussions": false,
"forks_count": 1091,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1091,
"watchers": 3978,
"watchers": 3980,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,7 +13,7 @@
"description": "GLPI automatic exploitation tool for CVE-2020-15175",
"fork": false,
"created_at": "2022-03-14T13:51:17Z",
"updated_at": "2023-06-21T18:16:30Z",
"updated_at": "2024-01-22T07:44:44Z",
"pushed_at": "2022-06-20T11:05:05Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -43,10 +43,10 @@
"description": "Exploit for CVE-2020-15778(OpenSSH vul)",
"fork": false,
"created_at": "2021-07-15T01:04:24Z",
"updated_at": "2024-01-21T16:48:45Z",
"updated_at": "2024-01-22T11:18:19Z",
"pushed_at": "2022-02-18T08:04:46Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

32
2020/CVE-2020-17531.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 319884337,
"name": "CVE-2020-17531",
"full_name": "154802388\/CVE-2020-17531",
"owner": {
"login": "154802388",
"id": 44390729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44390729?v=4",
"html_url": "https:\/\/github.com\/154802388"
},
"html_url": "https:\/\/github.com\/154802388\/CVE-2020-17531",
"description": "Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架。Apache Struts于2020年12月08日披露 S2-061 Struts 远程代码执行漏洞CVE-2020-17530在使用某些tag等情况下可能存在OGNL表达式注入漏洞从而造成远程代码执行风险极大。提醒我校Apache Struts用户尽快采取安全措施阻止漏洞攻击。",
"fork": false,
"created_at": "2020-12-09T08:01:10Z",
"updated_at": "2020-12-24T03:29:48Z",
"pushed_at": "2020-12-09T03:10:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2024-01-16T17:32:54Z",
"updated_at": "2024-01-22T06:46:03Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 407,
"watchers_count": 407,
"stargazers_count": 408,
"watchers_count": 408,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 129,
"watchers": 407,
"watchers": 408,
"score": 0,
"subscribers_count": 6
},

View file

@ -2125,11 +2125,11 @@
"html_url": "https:\/\/github.com\/wurwur"
},
"html_url": "https:\/\/github.com\/wurwur\/CVE-2021-3156",
"description": "Forked from @worawit, shorter&optimized. Only works for sudo=1.8.23 on Centos7",
"description": "Different files for computer security coursework",
"fork": false,
"created_at": "2024-01-22T04:42:34Z",
"updated_at": "2024-01-22T04:43:09Z",
"pushed_at": "2024-01-22T06:43:10Z",
"updated_at": "2024-01-22T06:44:07Z",
"pushed_at": "2024-01-22T08:07:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-01-17T16:03:44Z",
"updated_at": "2024-01-22T07:04:15Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1277,
"watchers_count": 1277,
"stargazers_count": 1278,
"watchers_count": 1278,
"has_discussions": false,
"forks_count": 317,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 317,
"watchers": 1277,
"watchers": 1278,
"score": 0,
"subscribers_count": 27
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-01-21T13:01:28Z",
"updated_at": "2024-01-22T11:58:05Z",
"pushed_at": "2023-11-08T21:02:16Z",
"stargazers_count": 1682,
"watchers_count": 1682,
"stargazers_count": 1681,
"watchers_count": 1681,
"has_discussions": false,
"forks_count": 497,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 497,
"watchers": 1682,
"watchers": 1681,
"score": 0,
"subscribers_count": 26
},

View file

@ -403,10 +403,10 @@
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2022-03-08T12:43:43Z",
"updated_at": "2024-01-15T01:24:35Z",
"updated_at": "2024-01-22T11:57:28Z",
"pushed_at": "2022-03-08T13:15:35Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -415,7 +415,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Code for veracode blog",
"fork": false,
"created_at": "2023-03-02T16:33:02Z",
"updated_at": "2023-12-20T10:51:33Z",
"updated_at": "2024-01-22T09:58:30Z",
"pushed_at": "2023-03-02T16:50:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 19,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2024-01-19T10:16:18Z",
"updated_at": "2024-01-22T11:57:30Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 693,
"watchers_count": 693,
"stargazers_count": 694,
"watchers_count": 694,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 111,
"watchers": 693,
"watchers": 694,
"score": 0,
"subscribers_count": 26
},

View file

@ -45,10 +45,10 @@
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2024-01-02T10:31:59Z",
"updated_at": "2024-01-22T12:18:31Z",
"pushed_at": "2022-06-05T21:06:13Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 149,
"watchers": 150,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Windows LPE exploit for CVE-2022-37969",
"fork": false,
"created_at": "2023-03-09T21:17:44Z",
"updated_at": "2024-01-02T10:32:19Z",
"updated_at": "2024-01-22T08:01:46Z",
"pushed_at": "2023-07-11T16:50:28Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2024-01-19T10:16:41Z",
"updated_at": "2024-01-22T08:48:21Z",
"pushed_at": "2023-02-25T08:52:03Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 267,
"watchers_count": 267,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 268,
"watchers": 267,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2024-01-19T15:51:17Z",
"updated_at": "2024-01-22T07:50:24Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 376,
"watchers_count": 376,
"stargazers_count": 375,
"watchers_count": 375,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 376,
"watchers": 375,
"score": 0,
"subscribers_count": 11
},

View file

@ -43,10 +43,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
"updated_at": "2024-01-21T08:28:39Z",
"updated_at": "2024-01-22T08:14:53Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "JDK CVE-2023-21939",
"fork": false,
"created_at": "2023-08-26T06:45:26Z",
"updated_at": "2024-01-11T11:21:40Z",
"updated_at": "2024-01-22T12:25:07Z",
"pushed_at": "2023-08-26T06:57:55Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
"fork": false,
"created_at": "2024-01-17T10:21:00Z",
"updated_at": "2024-01-17T10:21:00Z",
"updated_at": "2024-01-22T12:45:12Z",
"pushed_at": "2024-01-17T07:12:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,6 +55,36 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 746624870,
"name": "CVE-2023-22527",
"full_name": "Drun1baby\/CVE-2023-22527",
"owner": {
"login": "Drun1baby",
"id": 75228348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75228348?v=4",
"html_url": "https:\/\/github.com\/Drun1baby"
},
"html_url": "https:\/\/github.com\/Drun1baby\/CVE-2023-22527",
"description": null,
"fork": false,
"created_at": "2024-01-22T11:38:55Z",
"updated_at": "2024-01-22T11:38:56Z",
"pushed_at": "2024-01-22T12:07:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-08T22:00:44Z",
"updated_at": "2023-03-08T22:02:39Z",
"pushed_at": "2023-03-08T22:02:36Z",
"pushed_at": "2024-01-22T10:17:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exploit for Arbitrary File Read for CVE-2023-26360 - Adobe Coldfusion",
"fork": false,
"created_at": "2023-12-26T06:26:01Z",
"updated_at": "2024-01-12T01:45:58Z",
"updated_at": "2024-01-22T08:49:11Z",
"pushed_at": "2024-01-02T09:08:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -118,5 +118,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 746601760,
"name": "CVE-2023-28252-Compiled-exe",
"full_name": "duck-sec\/CVE-2023-28252-Compiled-exe",
"owner": {
"login": "duck-sec",
"id": 129839654,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129839654?v=4",
"html_url": "https:\/\/github.com\/duck-sec"
},
"html_url": "https:\/\/github.com\/duck-sec\/CVE-2023-28252-Compiled-exe",
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
"fork": false,
"created_at": "2024-01-22T10:38:02Z",
"updated_at": "2024-01-22T11:15:27Z",
"pushed_at": "2024-01-22T11:15:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2024-01-19T14:25:07Z",
"updated_at": "2024-01-22T11:57:42Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 598,
"watchers_count": 598,
"stargazers_count": 599,
"watchers_count": 599,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 51,
"watchers": 598,
"watchers": 599,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
"fork": false,
"created_at": "2024-01-11T19:17:13Z",
"updated_at": "2024-01-22T05:33:07Z",
"updated_at": "2024-01-22T12:03:07Z",
"pushed_at": "2024-01-11T19:42:03Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2024-01-11T20:56:17Z",
"updated_at": "2024-01-22T10:16:29Z",
"pushed_at": "2024-01-08T11:12:08Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 202,
"watchers": 203,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-01-22T06:50:30Z",
"updated_at": "2024-01-22T11:59:38Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 28,
"watchers": 31,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,10 +133,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-04T11:58:21Z",
"updated_at": "2024-01-07T05:03:20Z",
"updated_at": "2024-01-22T09:03:25Z",
"pushed_at": "2023-11-06T07:26:30Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,13 +138,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 12,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 11,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -124,10 +124,10 @@
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
"fork": false,
"created_at": "2024-01-02T14:20:10Z",
"updated_at": "2024-01-21T15:52:24Z",
"updated_at": "2024-01-22T08:19:28Z",
"pushed_at": "2024-01-02T15:43:26Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -206,10 +206,10 @@
"description": "The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.",
"fork": false,
"created_at": "2023-11-05T18:02:59Z",
"updated_at": "2023-12-26T02:36:31Z",
"updated_at": "2024-01-22T07:53:10Z",
"pushed_at": "2023-11-05T18:40:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -38,7 +38,7 @@
"wordpress"
],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 50,
"score": 0,
"subscribers_count": 2

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T10:53:50Z",
"updated_at": "2024-01-21T17:52:17Z",
"updated_at": "2024-01-22T11:49:33Z",
"pushed_at": "2024-01-12T13:56:38Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 1
},
@ -106,10 +106,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-01-21T22:27:28Z",
"updated_at": "2024-01-22T10:51:20Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -118,7 +118,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 195,
"watchers": 197,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-01-21T22:45:37Z",
"updated_at": "2024-01-22T12:24:32Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-33333.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 746540698,
"name": "CVE-2024-33333",
"full_name": "xiaoqiao147\/CVE-2024-33333",
"owner": {
"login": "xiaoqiao147",
"id": 67939405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67939405?v=4",
"html_url": "https:\/\/github.com\/xiaoqiao147"
},
"html_url": "https:\/\/github.com\/xiaoqiao147\/CVE-2024-33333",
"description": "CVE-2024-20656",
"fork": false,
"created_at": "2024-01-22T08:04:37Z",
"updated_at": "2024-01-22T09:52:00Z",
"pushed_at": "2024-01-22T08:04:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -64,6 +64,9 @@
- [mindstorm38/ensimag-secu3a-cve-2024-22416](https://github.com/mindstorm38/ensimag-secu3a-cve-2024-22416)
### CVE-2024-33333
- [xiaoqiao147/CVE-2024-33333](https://github.com/xiaoqiao147/CVE-2024-33333)
## 2023
### CVE-2023-0045 (2023-04-25)
@ -1724,6 +1727,7 @@
- [Sudistark/patch-diff-CVE-2023-22527](https://github.com/Sudistark/patch-diff-CVE-2023-22527)
- [ga0we1/CVE-2023-22527_Confluence_RCE](https://github.com/ga0we1/CVE-2023-22527_Confluence_RCE)
- [Drun1baby/CVE-2023-22527](https://github.com/Drun1baby/CVE-2023-22527)
### CVE-2023-22551 (2023-01-01)
@ -2595,6 +2599,7 @@
- [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252)
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
### CVE-2023-28329 (2023-03-23)
@ -23430,6 +23435,13 @@
- [keyuan15/CVE-2020-17530](https://github.com/keyuan15/CVE-2020-17530)
- [nth347/CVE-2020-17530](https://github.com/nth347/CVE-2020-17530)
### CVE-2020-17531 (2020-12-08)
<code>A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the &quot;sp&quot; parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
</code>
- [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531)
### CVE-2020-17533 (2020-12-29)
<code>Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
@ -32884,7 +32896,6 @@
- [cyberk1w1/CVE-2017-7529](https://github.com/cyberk1w1/CVE-2017-7529)
- [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529)
- [daehee/nginx-overflow](https://github.com/daehee/nginx-overflow)
- [gemboxteam/exploit-nginx-1.10.3](https://github.com/gemboxteam/exploit-nginx-1.10.3)
- [fardeen-ahmed/Remote-Integer-Overflow-Vulnerability](https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability)
- [mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability](https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability)
- [fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit](https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit)
@ -32927,7 +32938,6 @@
- [JrDw0/CVE-2017-7921-EXP](https://github.com/JrDw0/CVE-2017-7921-EXP)
- [BurnyMcDull/CVE-2017-7921](https://github.com/BurnyMcDull/CVE-2017-7921)
- [MisakaMikato/cve-2017-7921-golang](https://github.com/MisakaMikato/cve-2017-7921-golang)
- [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
- [p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
- [201646613/CVE-2017-7921](https://github.com/201646613/CVE-2017-7921)
@ -33153,7 +33163,6 @@
<code>Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
</code>
- [bao7uo/dp_crypto](https://github.com/bao7uo/dp_crypto)
- [capt-meelo/Telewreck](https://github.com/capt-meelo/Telewreck)
- [ictnamanh/CVE-2017-9248](https://github.com/ictnamanh/CVE-2017-9248)
- [ZhenwarX/Telerik-CVE-2017-9248-PoC](https://github.com/ZhenwarX/Telerik-CVE-2017-9248-PoC)
@ -33489,7 +33498,6 @@
</code>
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
### CVE-2017-11611 (2017-09-08)
@ -33545,12 +33553,10 @@
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
- [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882)
- [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882)
- [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882)
- [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882)
- [HaoJame/CVE-2017-11882](https://github.com/HaoJame/CVE-2017-11882)
- [5l1v3r1/rtfkit](https://github.com/5l1v3r1/rtfkit)
- [ActorExpose/CVE-2017-11882](https://github.com/ActorExpose/CVE-2017-11882)
- [Retr0-code/SignHere](https://github.com/Retr0-code/SignHere)
- [lisinan988/CVE-2017-11882-exp](https://github.com/lisinan988/CVE-2017-11882-exp)
- [tzwlhack/CVE-2017-11882](https://github.com/tzwlhack/CVE-2017-11882)
- [Sunqiz/CVE-2017-11882-reproduction](https://github.com/Sunqiz/CVE-2017-11882-reproduction)
@ -33622,7 +33628,6 @@
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
- [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615)
- [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615)
- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP)
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
- [xiaokp7/Tomcat_PUT_GUI_EXP](https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP)
@ -33933,13 +33938,6 @@
- [dewankpant/CVE-2017-16568](https://github.com/dewankpant/CVE-2017-16568)
### CVE-2017-16651 (2017-11-09)
<code>Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&amp;_action=upload-display&amp;_from=timezone requests.
</code>
- [ropbear/CVE-2017-16651](https://github.com/ropbear/CVE-2017-16651)
### CVE-2017-16720 (2018-01-05)
<code>A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device.