mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/01/22 12:54:56
This commit is contained in:
parent
f5a396ccc1
commit
cf4568a22d
45 changed files with 260 additions and 393 deletions
|
@ -28,35 +28,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 323575291,
|
||||
"name": "CVE-2017-11610",
|
||||
"full_name": "yaunsky\/CVE-2017-11610",
|
||||
"owner": {
|
||||
"login": "yaunsky",
|
||||
"id": 48243087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaunsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaunsky\/CVE-2017-11610",
|
||||
"description": "Supervisord远程命令执行漏洞脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-22T09:08:49Z",
|
||||
"updated_at": "2022-03-20T05:21:38Z",
|
||||
"pushed_at": "2020-12-22T09:12:07Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -636,36 +636,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 202340795,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "littlebin404\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "littlebin404",
|
||||
"id": 54022042,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54022042?v=4",
|
||||
"html_url": "https:\/\/github.com\/littlebin404"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/littlebin404\/CVE-2017-11882",
|
||||
"description": "CVE-2017-11882(通杀Office 2003到2016)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-14T11:55:00Z",
|
||||
"updated_at": "2023-09-28T11:05:07Z",
|
||||
"pushed_at": "2020-12-22T07:23:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 232606684,
|
||||
"name": "Overflow-Demo-CVE-2017-11882",
|
||||
|
@ -786,49 +756,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 332744031,
|
||||
"name": "SignHere",
|
||||
"full_name": "Retr0-code\/SignHere",
|
||||
"owner": {
|
||||
"login": "Retr0-code",
|
||||
"id": 60541996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60541996?v=4",
|
||||
"html_url": "https:\/\/github.com\/Retr0-code"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Retr0-code\/SignHere",
|
||||
"description": "SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T12:44:03Z",
|
||||
"updated_at": "2023-02-12T18:04:41Z",
|
||||
"pushed_at": "2021-01-26T16:29:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"automation",
|
||||
"build-tool",
|
||||
"builder",
|
||||
"cve",
|
||||
"cve-2017-11882",
|
||||
"equation",
|
||||
"malicious",
|
||||
"microsoft",
|
||||
"office",
|
||||
"python3",
|
||||
"rtf",
|
||||
"vulnerabilities"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 431719997,
|
||||
"name": "CVE-2017-11882-exp",
|
||||
|
|
|
@ -299,36 +299,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 328929654,
|
||||
"name": "CVE-2017-12615-EXP",
|
||||
"full_name": "w0x68y\/CVE-2017-12615-EXP",
|
||||
"owner": {
|
||||
"login": "w0x68y",
|
||||
"id": 22195911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
|
||||
"html_url": "https:\/\/github.com\/w0x68y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP",
|
||||
"description": "CVE-2017-12615 任意文件写入exp,写入webshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T09:07:12Z",
|
||||
"updated_at": "2022-10-23T07:40:44Z",
|
||||
"pushed_at": "2021-01-13T03:23:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 565419626,
|
||||
"name": "AttackTomcat",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 327169091,
|
||||
"name": "CVE-2017-16651",
|
||||
"full_name": "ropbear\/CVE-2017-16651",
|
||||
"owner": {
|
||||
"login": "ropbear",
|
||||
"id": 11134586,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134586?v=4",
|
||||
"html_url": "https:\/\/github.com\/ropbear"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ropbear\/CVE-2017-16651",
|
||||
"description": "Python implementation of Roundcube LFI (CVE-2017-16651)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-06T01:46:39Z",
|
||||
"updated_at": "2023-09-24T16:23:48Z",
|
||||
"pushed_at": "2021-01-06T01:47:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -209,36 +209,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 330894535,
|
||||
"name": "exploit-nginx-1.10.3",
|
||||
"full_name": "gemboxteam\/exploit-nginx-1.10.3",
|
||||
"owner": {
|
||||
"login": "gemboxteam",
|
||||
"id": 27276452,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27276452?v=4",
|
||||
"html_url": "https:\/\/github.com\/gemboxteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gemboxteam\/exploit-nginx-1.10.3",
|
||||
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-19T07:12:10Z",
|
||||
"updated_at": "2023-12-26T17:34:28Z",
|
||||
"pushed_at": "2021-01-19T07:17:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 331347189,
|
||||
"name": "Remote-Integer-Overflow-Vulnerability",
|
||||
|
|
|
@ -59,36 +59,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 312471106,
|
||||
"name": "cve-2017-7921-golang",
|
||||
"full_name": "MisakaMikato\/cve-2017-7921-golang",
|
||||
"owner": {
|
||||
"login": "MisakaMikato",
|
||||
"id": 31957147,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957147?v=4",
|
||||
"html_url": "https:\/\/github.com\/MisakaMikato"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang",
|
||||
"description": "Hikvision IP camera access bypass exploit, developed by golang. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T04:15:31Z",
|
||||
"updated_at": "2023-06-25T06:04:21Z",
|
||||
"pushed_at": "2021-01-11T05:52:22Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 334195499,
|
||||
"name": "hikvision_CVE-2017-7921_auth_bypass_config_decryptor",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 117610085,
|
||||
"name": "dp_crypto",
|
||||
"full_name": "bao7uo\/dp_crypto",
|
||||
"owner": {
|
||||
"login": "bao7uo",
|
||||
"id": 21125224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21125224?v=4",
|
||||
"html_url": "https:\/\/github.com\/bao7uo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bao7uo\/dp_crypto",
|
||||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2024-01-14T06:47:28Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 162,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 143378191,
|
||||
"name": "Telewreck",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2024-01-19T21:09:16Z",
|
||||
"updated_at": "2024-01-22T11:56:55Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 780,
|
||||
"watchers_count": 780,
|
||||
"stargazers_count": 781,
|
||||
"watchers_count": 781,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 780,
|
||||
"watchers": 781,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-01-22T03:33:50Z",
|
||||
"updated_at": "2024-01-22T09:28:44Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3978,
|
||||
"watchers_count": 3978,
|
||||
"stargazers_count": 3980,
|
||||
"watchers_count": 3980,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1091,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1091,
|
||||
"watchers": 3978,
|
||||
"watchers": 3980,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-01-22T03:33:50Z",
|
||||
"updated_at": "2024-01-22T09:28:44Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3978,
|
||||
"watchers_count": 3978,
|
||||
"stargazers_count": 3980,
|
||||
"watchers_count": 3980,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1091,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1091,
|
||||
"watchers": 3978,
|
||||
"watchers": 3980,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "GLPI automatic exploitation tool for CVE-2020-15175",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-14T13:51:17Z",
|
||||
"updated_at": "2023-06-21T18:16:30Z",
|
||||
"updated_at": "2024-01-22T07:44:44Z",
|
||||
"pushed_at": "2022-06-20T11:05:05Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit for CVE-2020-15778(OpenSSH vul)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T01:04:24Z",
|
||||
"updated_at": "2024-01-21T16:48:45Z",
|
||||
"updated_at": "2024-01-22T11:18:19Z",
|
||||
"pushed_at": "2022-02-18T08:04:46Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2020/CVE-2020-17531.json
Normal file
32
2020/CVE-2020-17531.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 319884337,
|
||||
"name": "CVE-2020-17531",
|
||||
"full_name": "154802388\/CVE-2020-17531",
|
||||
"owner": {
|
||||
"login": "154802388",
|
||||
"id": 44390729,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44390729?v=4",
|
||||
"html_url": "https:\/\/github.com\/154802388"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/154802388\/CVE-2020-17531",
|
||||
"description": "Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架。Apache Struts于2020年12月08日披露 S2-061 Struts 远程代码执行漏洞(CVE-2020-17530),在使用某些tag等情况下可能存在OGNL表达式注入漏洞,从而造成远程代码执行,风险极大。提醒我校Apache Struts用户尽快采取安全措施阻止漏洞攻击。",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T08:01:10Z",
|
||||
"updated_at": "2020-12-24T03:29:48Z",
|
||||
"pushed_at": "2020-12-09T03:10:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2024-01-16T17:32:54Z",
|
||||
"updated_at": "2024-01-22T06:46:03Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 407,
|
||||
"watchers_count": 407,
|
||||
"stargazers_count": 408,
|
||||
"watchers_count": 408,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 407,
|
||||
"watchers": 408,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -2125,11 +2125,11 @@
|
|||
"html_url": "https:\/\/github.com\/wurwur"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wurwur\/CVE-2021-3156",
|
||||
"description": "Forked from @worawit, shorter&optimized. Only works for sudo=1.8.23 on Centos7",
|
||||
"description": "Different files for computer security coursework",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T04:42:34Z",
|
||||
"updated_at": "2024-01-22T04:43:09Z",
|
||||
"pushed_at": "2024-01-22T06:43:10Z",
|
||||
"updated_at": "2024-01-22T06:44:07Z",
|
||||
"pushed_at": "2024-01-22T08:07:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2024-01-17T16:03:44Z",
|
||||
"updated_at": "2024-01-22T07:04:15Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1277,
|
||||
"watchers_count": 1277,
|
||||
"stargazers_count": 1278,
|
||||
"watchers_count": 1278,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1277,
|
||||
"watchers": 1278,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-01-21T13:01:28Z",
|
||||
"updated_at": "2024-01-22T11:58:05Z",
|
||||
"pushed_at": "2023-11-08T21:02:16Z",
|
||||
"stargazers_count": 1682,
|
||||
"watchers_count": 1682,
|
||||
"stargazers_count": 1681,
|
||||
"watchers_count": 1681,
|
||||
"has_discussions": false,
|
||||
"forks_count": 497,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 497,
|
||||
"watchers": 1682,
|
||||
"watchers": 1681,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -403,10 +403,10 @@
|
|||
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T12:43:43Z",
|
||||
"updated_at": "2024-01-15T01:24:35Z",
|
||||
"updated_at": "2024-01-22T11:57:28Z",
|
||||
"pushed_at": "2022-03-08T13:15:35Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -415,7 +415,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Code for veracode blog",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-02T16:33:02Z",
|
||||
"updated_at": "2023-12-20T10:51:33Z",
|
||||
"updated_at": "2024-01-22T09:58:30Z",
|
||||
"pushed_at": "2023-03-02T16:50:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2024-01-19T10:16:18Z",
|
||||
"updated_at": "2024-01-22T11:57:30Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 693,
|
||||
"watchers": 694,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2024-01-02T10:31:59Z",
|
||||
"updated_at": "2024-01-22T12:18:31Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -65,7 +65,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 149,
|
||||
"watchers": 150,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows LPE exploit for CVE-2022-37969",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T21:17:44Z",
|
||||
"updated_at": "2024-01-02T10:32:19Z",
|
||||
"updated_at": "2024-01-22T08:01:46Z",
|
||||
"pushed_at": "2023-07-11T16:50:28Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2024-01-19T10:16:41Z",
|
||||
"updated_at": "2024-01-22T08:48:21Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 268,
|
||||
"watchers": 267,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2024-01-19T15:51:17Z",
|
||||
"updated_at": "2024-01-22T07:50:24Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 376,
|
||||
"watchers_count": 376,
|
||||
"stargazers_count": 375,
|
||||
"watchers_count": 375,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 376,
|
||||
"watchers": 375,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T13:54:42Z",
|
||||
"updated_at": "2024-01-21T08:28:39Z",
|
||||
"updated_at": "2024-01-22T08:14:53Z",
|
||||
"pushed_at": "2023-02-24T13:29:38Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "JDK CVE-2023-21939",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-26T06:45:26Z",
|
||||
"updated_at": "2024-01-11T11:21:40Z",
|
||||
"updated_at": "2024-01-22T12:25:07Z",
|
||||
"pushed_at": "2023-08-26T06:57:55Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-17T10:21:00Z",
|
||||
"updated_at": "2024-01-17T10:21:00Z",
|
||||
"updated_at": "2024-01-22T12:45:12Z",
|
||||
"pushed_at": "2024-01-17T07:12:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,6 +55,36 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 746624870,
|
||||
"name": "CVE-2023-22527",
|
||||
"full_name": "Drun1baby\/CVE-2023-22527",
|
||||
"owner": {
|
||||
"login": "Drun1baby",
|
||||
"id": 75228348,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75228348?v=4",
|
||||
"html_url": "https:\/\/github.com\/Drun1baby"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Drun1baby\/CVE-2023-22527",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T11:38:55Z",
|
||||
"updated_at": "2024-01-22T11:38:56Z",
|
||||
"pushed_at": "2024-01-22T12:07:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-03-08T22:00:44Z",
|
||||
"updated_at": "2023-03-08T22:02:39Z",
|
||||
"pushed_at": "2023-03-08T22:02:36Z",
|
||||
"pushed_at": "2024-01-22T10:17:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for Arbitrary File Read for CVE-2023-26360 - Adobe Coldfusion",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-26T06:26:01Z",
|
||||
"updated_at": "2024-01-12T01:45:58Z",
|
||||
"updated_at": "2024-01-22T08:49:11Z",
|
||||
"pushed_at": "2024-01-02T09:08:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -118,5 +118,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 746601760,
|
||||
"name": "CVE-2023-28252-Compiled-exe",
|
||||
"full_name": "duck-sec\/CVE-2023-28252-Compiled-exe",
|
||||
"owner": {
|
||||
"login": "duck-sec",
|
||||
"id": 129839654,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129839654?v=4",
|
||||
"html_url": "https:\/\/github.com\/duck-sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/duck-sec\/CVE-2023-28252-Compiled-exe",
|
||||
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T10:38:02Z",
|
||||
"updated_at": "2024-01-22T11:15:27Z",
|
||||
"pushed_at": "2024-01-22T11:15:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2024-01-19T14:25:07Z",
|
||||
"updated_at": "2024-01-22T11:57:42Z",
|
||||
"pushed_at": "2023-08-17T19:26:55Z",
|
||||
"stargazers_count": 598,
|
||||
"watchers_count": 598,
|
||||
"stargazers_count": 599,
|
||||
"watchers_count": 599,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 598,
|
||||
"watchers": 599,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-11T19:17:13Z",
|
||||
"updated_at": "2024-01-22T05:33:07Z",
|
||||
"updated_at": "2024-01-22T12:03:07Z",
|
||||
"pushed_at": "2024-01-11T19:42:03Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T14:20:42Z",
|
||||
"updated_at": "2024-01-11T20:56:17Z",
|
||||
"updated_at": "2024-01-22T10:16:29Z",
|
||||
"pushed_at": "2024-01-08T11:12:08Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 202,
|
||||
"watchers": 203,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T07:14:06Z",
|
||||
"updated_at": "2024-01-22T06:50:30Z",
|
||||
"updated_at": "2024-01-22T11:59:38Z",
|
||||
"pushed_at": "2024-01-21T05:04:01Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-04T11:58:21Z",
|
||||
"updated_at": "2024-01-07T05:03:20Z",
|
||||
"updated_at": "2024-01-22T09:03:25Z",
|
||||
"pushed_at": "2023-11-06T07:26:30Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 11,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -124,10 +124,10 @@
|
|||
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T14:20:10Z",
|
||||
"updated_at": "2024-01-21T15:52:24Z",
|
||||
"updated_at": "2024-01-22T08:19:28Z",
|
||||
"pushed_at": "2024-01-02T15:43:26Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -206,10 +206,10 @@
|
|||
"description": "The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-05T18:02:59Z",
|
||||
"updated_at": "2023-12-26T02:36:31Z",
|
||||
"updated_at": "2024-01-22T07:53:10Z",
|
||||
"pushed_at": "2023-11-05T18:40:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -218,7 +218,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -38,7 +38,7 @@
|
|||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-7028",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T10:53:50Z",
|
||||
"updated_at": "2024-01-21T17:52:17Z",
|
||||
"updated_at": "2024-01-22T11:49:33Z",
|
||||
"pushed_at": "2024-01-12T13:56:38Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -106,10 +106,10 @@
|
|||
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T18:29:27Z",
|
||||
"updated_at": "2024-01-21T22:27:28Z",
|
||||
"updated_at": "2024-01-22T10:51:20Z",
|
||||
"pushed_at": "2024-01-13T13:50:20Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -118,7 +118,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 195,
|
||||
"watchers": 197,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T15:08:01Z",
|
||||
"updated_at": "2024-01-21T22:45:37Z",
|
||||
"updated_at": "2024-01-22T12:24:32Z",
|
||||
"pushed_at": "2024-01-14T07:14:33Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-33333.json
Normal file
32
2024/CVE-2024-33333.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 746540698,
|
||||
"name": "CVE-2024-33333",
|
||||
"full_name": "xiaoqiao147\/CVE-2024-33333",
|
||||
"owner": {
|
||||
"login": "xiaoqiao147",
|
||||
"id": 67939405,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67939405?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiaoqiao147"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiaoqiao147\/CVE-2024-33333",
|
||||
"description": "CVE-2024-20656",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T08:04:37Z",
|
||||
"updated_at": "2024-01-22T09:52:00Z",
|
||||
"pushed_at": "2024-01-22T08:04:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
26
README.md
26
README.md
|
@ -64,6 +64,9 @@
|
|||
|
||||
- [mindstorm38/ensimag-secu3a-cve-2024-22416](https://github.com/mindstorm38/ensimag-secu3a-cve-2024-22416)
|
||||
|
||||
### CVE-2024-33333
|
||||
- [xiaoqiao147/CVE-2024-33333](https://github.com/xiaoqiao147/CVE-2024-33333)
|
||||
|
||||
|
||||
## 2023
|
||||
### CVE-2023-0045 (2023-04-25)
|
||||
|
@ -1724,6 +1727,7 @@
|
|||
|
||||
- [Sudistark/patch-diff-CVE-2023-22527](https://github.com/Sudistark/patch-diff-CVE-2023-22527)
|
||||
- [ga0we1/CVE-2023-22527_Confluence_RCE](https://github.com/ga0we1/CVE-2023-22527_Confluence_RCE)
|
||||
- [Drun1baby/CVE-2023-22527](https://github.com/Drun1baby/CVE-2023-22527)
|
||||
|
||||
### CVE-2023-22551 (2023-01-01)
|
||||
|
||||
|
@ -2595,6 +2599,7 @@
|
|||
- [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252)
|
||||
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
|
||||
- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
|
||||
- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
|
||||
|
||||
### CVE-2023-28329 (2023-03-23)
|
||||
|
||||
|
@ -23430,6 +23435,13 @@
|
|||
- [keyuan15/CVE-2020-17530](https://github.com/keyuan15/CVE-2020-17530)
|
||||
- [nth347/CVE-2020-17530](https://github.com/nth347/CVE-2020-17530)
|
||||
|
||||
### CVE-2020-17531 (2020-12-08)
|
||||
|
||||
<code>A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
|
||||
</code>
|
||||
|
||||
- [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531)
|
||||
|
||||
### CVE-2020-17533 (2020-12-29)
|
||||
|
||||
<code>Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
|
||||
|
@ -32884,7 +32896,6 @@
|
|||
- [cyberk1w1/CVE-2017-7529](https://github.com/cyberk1w1/CVE-2017-7529)
|
||||
- [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529)
|
||||
- [daehee/nginx-overflow](https://github.com/daehee/nginx-overflow)
|
||||
- [gemboxteam/exploit-nginx-1.10.3](https://github.com/gemboxteam/exploit-nginx-1.10.3)
|
||||
- [fardeen-ahmed/Remote-Integer-Overflow-Vulnerability](https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability)
|
||||
- [mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability](https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability)
|
||||
- [fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit](https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit)
|
||||
|
@ -32927,7 +32938,6 @@
|
|||
|
||||
- [JrDw0/CVE-2017-7921-EXP](https://github.com/JrDw0/CVE-2017-7921-EXP)
|
||||
- [BurnyMcDull/CVE-2017-7921](https://github.com/BurnyMcDull/CVE-2017-7921)
|
||||
- [MisakaMikato/cve-2017-7921-golang](https://github.com/MisakaMikato/cve-2017-7921-golang)
|
||||
- [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
|
||||
- [p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
|
||||
- [201646613/CVE-2017-7921](https://github.com/201646613/CVE-2017-7921)
|
||||
|
@ -33153,7 +33163,6 @@
|
|||
<code>Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
|
||||
</code>
|
||||
|
||||
- [bao7uo/dp_crypto](https://github.com/bao7uo/dp_crypto)
|
||||
- [capt-meelo/Telewreck](https://github.com/capt-meelo/Telewreck)
|
||||
- [ictnamanh/CVE-2017-9248](https://github.com/ictnamanh/CVE-2017-9248)
|
||||
- [ZhenwarX/Telerik-CVE-2017-9248-PoC](https://github.com/ZhenwarX/Telerik-CVE-2017-9248-PoC)
|
||||
|
@ -33489,7 +33498,6 @@
|
|||
</code>
|
||||
|
||||
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
|
||||
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
|
||||
|
||||
### CVE-2017-11611 (2017-09-08)
|
||||
|
||||
|
@ -33545,12 +33553,10 @@
|
|||
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
|
||||
- [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882)
|
||||
- [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882)
|
||||
- [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882)
|
||||
- [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882)
|
||||
- [HaoJame/CVE-2017-11882](https://github.com/HaoJame/CVE-2017-11882)
|
||||
- [5l1v3r1/rtfkit](https://github.com/5l1v3r1/rtfkit)
|
||||
- [ActorExpose/CVE-2017-11882](https://github.com/ActorExpose/CVE-2017-11882)
|
||||
- [Retr0-code/SignHere](https://github.com/Retr0-code/SignHere)
|
||||
- [lisinan988/CVE-2017-11882-exp](https://github.com/lisinan988/CVE-2017-11882-exp)
|
||||
- [tzwlhack/CVE-2017-11882](https://github.com/tzwlhack/CVE-2017-11882)
|
||||
- [Sunqiz/CVE-2017-11882-reproduction](https://github.com/Sunqiz/CVE-2017-11882-reproduction)
|
||||
|
@ -33622,7 +33628,6 @@
|
|||
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
|
||||
- [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615)
|
||||
- [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615)
|
||||
- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP)
|
||||
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
|
||||
- [xiaokp7/Tomcat_PUT_GUI_EXP](https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP)
|
||||
|
||||
|
@ -33933,13 +33938,6 @@
|
|||
|
||||
- [dewankpant/CVE-2017-16568](https://github.com/dewankpant/CVE-2017-16568)
|
||||
|
||||
### CVE-2017-16651 (2017-11-09)
|
||||
|
||||
<code>Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
|
||||
</code>
|
||||
|
||||
- [ropbear/CVE-2017-16651](https://github.com/ropbear/CVE-2017-16651)
|
||||
|
||||
### CVE-2017-16720 (2018-01-05)
|
||||
|
||||
<code>A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device.
|
||||
|
|
Loading…
Reference in a new issue