Auto Update 2023/04/19 06:29:15

This commit is contained in:
motikan2010-bot 2023-04-19 15:29:15 +09:00
parent 824564fdc8
commit d09e0fa2f6
41 changed files with 178 additions and 208 deletions

View file

@ -433,10 +433,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-04-16T07:12:02Z",
"updated_at": "2023-04-19T03:13:00Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 727,
"watchers_count": 727,
"stargazers_count": 728,
"watchers_count": 728,
"has_discussions": false,
"forks_count": 433,
"allow_forking": true,
@ -449,7 +449,7 @@
],
"visibility": "public",
"forks": 433,
"watchers": 727,
"watchers": 728,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2023-04-13T09:50:39Z",
"updated_at": "2023-04-19T05:35:46Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 146,
"forks": 44,
"watchers": 147,
"score": 0
}
]

View file

@ -369,10 +369,10 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2023-03-31T14:18:34Z",
"updated_at": "2023-04-19T02:56:18Z",
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -381,7 +381,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 98,
"watchers": 99,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-16T13:53:55Z",
"updated_at": "2023-04-19T02:29:19Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3729,
"watchers_count": 3729,
"stargazers_count": 3730,
"watchers_count": 3730,
"has_discussions": false,
"forks_count": 1077,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1077,
"watchers": 3729,
"watchers": 3730,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Tesla Model 3 Hack DoS Entire Touchscreen Interface CVE-2020-10558",
"fork": false,
"created_at": "2020-03-16T16:55:18Z",
"updated_at": "2023-01-24T00:01:58Z",
"updated_at": "2023-04-19T02:47:55Z",
"pushed_at": "2023-01-30T06:44:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2023-04-17T06:37:26Z",
"updated_at": "2023-04-19T06:10:24Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1019,
"watchers_count": 1019,
"stargazers_count": 1021,
"watchers_count": 1021,
"has_discussions": false,
"forks_count": 273,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 273,
"watchers": 1019,
"watchers": 1021,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-16T13:53:55Z",
"updated_at": "2023-04-19T02:29:19Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3729,
"watchers_count": 3729,
"stargazers_count": 3730,
"watchers_count": 3730,
"has_discussions": false,
"forks_count": 1077,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1077,
"watchers": 3729,
"watchers": 3730,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-04-17T19:44:03Z",
"updated_at": "2023-04-19T06:09:14Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 1017,
"watchers_count": 1017,
"stargazers_count": 1018,
"watchers_count": 1018,
"has_discussions": false,
"forks_count": 320,
"allow_forking": true,
@ -145,7 +145,7 @@
],
"visibility": "public",
"forks": 320,
"watchers": 1017,
"watchers": 1018,
"score": 0
}
]

View file

@ -778,10 +778,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-18T08:06:11Z",
"updated_at": "2023-04-19T04:59:37Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 872,
"watchers_count": 872,
"stargazers_count": 873,
"watchers_count": 873,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -797,7 +797,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 872,
"watchers": 873,
"score": 0
}
]

View file

@ -134,7 +134,7 @@
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 100,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -142,7 +142,7 @@
"cve-2021-22205"
],
"visibility": "public",
"forks": 100,
"forks": 101,
"watchers": 222,
"score": 0
},

View file

@ -129,10 +129,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-04-17T19:44:03Z",
"updated_at": "2023-04-19T06:09:14Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 1017,
"watchers_count": 1017,
"stargazers_count": 1018,
"watchers_count": 1018,
"has_discussions": false,
"forks_count": 320,
"allow_forking": true,
@ -145,7 +145,7 @@
],
"visibility": "public",
"forks": 320,
"watchers": 1017,
"watchers": 1018,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2023-03-28T13:36:24Z",
"updated_at": "2023-04-19T02:23:59Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 233,
"watchers": 234,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2023-04-18T03:10:40Z",
"updated_at": "2023-04-19T02:00:29Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -144,7 +144,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 69,
"watchers": 70,
"score": 0
}
]

View file

@ -77,10 +77,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-04-18T18:04:08Z",
"updated_at": "2023-04-19T02:51:33Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1791,
"watchers_count": 1791,
"stargazers_count": 1792,
"watchers_count": 1792,
"has_discussions": false,
"forks_count": 507,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 507,
"watchers": 1791,
"watchers": 1792,
"score": 0
},
{
@ -169,7 +169,7 @@
"stargazers_count": 960,
"watchers_count": 960,
"has_discussions": false,
"forks_count": 312,
"forks_count": 313,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -179,7 +179,7 @@
"poc"
],
"visibility": "public",
"forks": 312,
"forks": 313,
"watchers": 960,
"score": 0
},
@ -908,10 +908,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-04-18T02:42:28Z",
"updated_at": "2023-04-19T02:49:46Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 772,
"watchers_count": 772,
"stargazers_count": 771,
"watchers_count": 771,
"has_discussions": false,
"forks_count": 159,
"allow_forking": true,
@ -922,7 +922,7 @@
],
"visibility": "public",
"forks": 159,
"watchers": 772,
"watchers": 771,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2023-04-14T16:51:31Z",
"updated_at": "2023-04-19T02:37:39Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 440,
"watchers_count": 440,
"stargazers_count": 441,
"watchers_count": 441,
"has_discussions": false,
"forks_count": 94,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 440,
"watchers": 441,
"score": 0
},
{

View file

@ -524,10 +524,10 @@
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
"fork": false,
"created_at": "2021-12-11T18:49:30Z",
"updated_at": "2023-03-06T06:36:56Z",
"updated_at": "2023-04-19T02:38:50Z",
"pushed_at": "2021-12-11T19:10:03Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -536,7 +536,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 26,
"score": 0
},

View file

@ -972,10 +972,10 @@
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
"fork": false,
"created_at": "2021-12-10T23:35:31Z",
"updated_at": "2023-04-15T22:39:07Z",
"updated_at": "2023-04-19T04:59:59Z",
"pushed_at": "2021-12-14T13:43:35Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -989,7 +989,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 94,
"watchers": 95,
"score": 0
},
{
@ -1259,10 +1259,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-04-18T16:40:36Z",
"updated_at": "2023-04-19T02:20:34Z",
"pushed_at": "2023-03-21T03:01:52Z",
"stargazers_count": 653,
"watchers_count": 653,
"stargazers_count": 654,
"watchers_count": 654,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -1276,7 +1276,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 653,
"watchers": 654,
"score": 0
},
{
@ -3647,10 +3647,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-04-18T12:08:42Z",
"updated_at": "2023-04-19T02:55:43Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3231,
"watchers_count": 3231,
"stargazers_count": 3233,
"watchers_count": 3233,
"has_discussions": true,
"forks_count": 746,
"allow_forking": true,
@ -3659,7 +3659,7 @@
"topics": [],
"visibility": "public",
"forks": 746,
"watchers": 3231,
"watchers": 3233,
"score": 0
},
{
@ -10359,10 +10359,10 @@
"description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
"fork": false,
"created_at": "2022-01-05T22:25:42Z",
"updated_at": "2023-04-17T04:21:17Z",
"updated_at": "2023-04-19T02:32:00Z",
"pushed_at": "2022-01-10T19:26:59Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -10371,7 +10371,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 103,
"watchers": 104,
"score": 0
},
{
@ -11797,10 +11797,10 @@
"description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.",
"fork": false,
"created_at": "2023-01-31T20:29:26Z",
"updated_at": "2023-02-26T06:00:44Z",
"updated_at": "2023-04-19T06:17:37Z",
"pushed_at": "2023-01-31T20:35:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -11823,7 +11823,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -161,10 +161,10 @@
"description": "Samples of log4j library versions to help log4j scanners \/ detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-16T18:12:29Z",
"updated_at": "2022-03-31T03:02:07Z",
"updated_at": "2023-04-19T01:51:35Z",
"pushed_at": "2021-12-30T05:15:54Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -177,7 +177,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -129,19 +129,19 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2023-04-18T19:10:30Z",
"updated_at": "2023-04-19T06:14:23Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1022,
"watchers_count": 1022,
"stargazers_count": 1024,
"watchers_count": 1024,
"has_discussions": false,
"forks_count": 222,
"forks_count": 221,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 222,
"watchers": 1022,
"forks": 221,
"watchers": 1024,
"score": 0
},
{
@ -274,19 +274,19 @@
"description": null,
"fork": false,
"created_at": "2022-03-08T07:42:31Z",
"updated_at": "2022-03-08T03:57:15Z",
"updated_at": "2023-04-19T03:09:56Z",
"pushed_at": "2022-03-08T05:18:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 0,
"forks": 6,
"watchers": 1,
"score": 0
},
{

View file

@ -1302,10 +1302,10 @@
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行CVE-2022-22947 注入哥斯拉内存马",
"fork": false,
"created_at": "2022-05-16T15:27:41Z",
"updated_at": "2023-04-10T10:21:16Z",
"updated_at": "2023-04-19T00:55:30Z",
"pushed_at": "2022-05-16T15:33:37Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1314,7 +1314,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -709,10 +709,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-18T08:06:11Z",
"updated_at": "2023-04-19T04:59:37Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 872,
"watchers_count": 872,
"stargazers_count": 873,
"watchers_count": 873,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -728,7 +728,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 872,
"watchers": 873,
"score": 0
},
{

View file

@ -557,10 +557,10 @@
"description": "CVE-2022-22963 RCE PoC in python",
"fork": false,
"created_at": "2023-03-13T13:28:55Z",
"updated_at": "2023-03-29T20:16:02Z",
"updated_at": "2023-04-19T01:41:09Z",
"pushed_at": "2023-03-14T15:23:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -569,7 +569,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-04-18T13:13:46Z",
"updated_at": "2023-04-19T04:59:19Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 962,
"watchers_count": 962,
"stargazers_count": 963,
"watchers_count": 963,
"has_discussions": true,
"forks_count": 172,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 172,
"watchers": 962,
"watchers": 963,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-31T09:01:17Z",
"updated_at": "2023-02-25T13:22:30Z",
"updated_at": "2023-04-19T04:00:06Z",
"pushed_at": "2023-01-31T09:10:21Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -131,10 +131,10 @@
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
"fork": false,
"created_at": "2022-04-20T20:54:26Z",
"updated_at": "2023-04-14T16:51:34Z",
"updated_at": "2023-04-19T04:00:01Z",
"pushed_at": "2022-04-25T20:38:57Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -143,7 +143,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-04-13T13:19:04Z",
"updated_at": "2023-04-13T13:36:05Z",
"pushed_at": "2023-04-13T13:23:23Z",
"pushed_at": "2023-04-19T06:27:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1118,8 +1118,8 @@
"description": "docker for CVE-2022-42889",
"fork": false,
"created_at": "2023-04-04T20:08:08Z",
"updated_at": "2023-04-04T20:53:14Z",
"pushed_at": "2023-04-05T18:35:29Z",
"updated_at": "2023-04-19T05:53:19Z",
"pushed_at": "2023-04-19T05:53:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-04-18T12:36:28Z",
"updated_at": "2023-04-19T04:29:36Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 177,
"watchers": 178,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
"fork": false,
"created_at": "2023-04-16T10:05:13Z",
"updated_at": "2023-04-19T00:25:52Z",
"updated_at": "2023-04-19T06:13:48Z",
"pushed_at": "2023-04-18T13:02:21Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 40,
"forks": 5,
"watchers": 52,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-04-17T00:25:16Z",
"updated_at": "2023-04-18T11:40:40Z",
"pushed_at": "2023-04-17T00:39:35Z",
"pushed_at": "2023-04-19T00:40:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -1,33 +1,4 @@
[
{
"id": 629575365,
"name": "CVE-2023-21554-POC",
"full_name": "b4rt0xx\/CVE-2023-21554-POC",
"owner": {
"login": "b4rt0xx",
"id": 131168792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131168792?v=4",
"html_url": "https:\/\/github.com\/b4rt0xx"
},
"html_url": "https:\/\/github.com\/b4rt0xx\/CVE-2023-21554-POC",
"description": "CVE-2023-21554 unauthenticated RCE in Microsoft Message Queuing (MSMQ) aka QueueJumper",
"fork": false,
"created_at": "2023-04-18T15:30:17Z",
"updated_at": "2023-04-18T15:30:18Z",
"pushed_at": "2023-04-18T15:31:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 629580642,
"name": "PoC-CVE-2023-21554",

View file

@ -18,13 +18,13 @@
"stargazers_count": 386,
"watchers_count": 386,
"has_discussions": false,
"forks_count": 145,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 145,
"forks": 146,
"watchers": 386,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
"fork": false,
"created_at": "2023-01-21T15:19:23Z",
"updated_at": "2023-04-10T17:18:44Z",
"updated_at": "2023-04-19T02:51:36Z",
"pushed_at": "2023-02-15T18:10:53Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.",
"fork": false,
"created_at": "2023-01-24T08:33:19Z",
"updated_at": "2023-04-17T14:24:27Z",
"updated_at": "2023-04-19T04:01:50Z",
"pushed_at": "2023-01-24T12:51:29Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 70,
"watchers": 71,
"score": 0
},
{

View file

@ -168,10 +168,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-04-17T09:15:53Z",
"updated_at": "2023-04-19T06:11:18Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 293,
"watchers_count": 293,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 290,
"watchers": 293,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
"fork": false,
"created_at": "2023-04-18T21:47:47Z",
"updated_at": "2023-04-18T21:49:17Z",
"updated_at": "2023-04-19T03:31:49Z",
"pushed_at": "2023-04-18T21:52:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-02-09T10:49:46Z",
"updated_at": "2023-04-09T03:13:11Z",
"updated_at": "2023-04-19T04:10:42Z",
"pushed_at": "2023-02-09T11:00:26Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 75,
"forks": 29,
"watchers": 79,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-28434 nuclei templates",
"fork": false,
"created_at": "2023-03-23T14:44:24Z",
"updated_at": "2023-04-01T09:28:44Z",
"updated_at": "2023-04-19T03:27:14Z",
"pushed_at": "2023-03-23T15:53:05Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
"fork": false,
"created_at": "2023-03-27T08:53:04Z",
"updated_at": "2023-04-18T15:20:12Z",
"updated_at": "2023-04-19T01:34:23Z",
"pushed_at": "2023-04-04T05:26:59Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 186,
"watchers": 187,
"score": 0
}
]

View file

@ -222,7 +222,6 @@ In BitmapExport.java, there is a possible failure to truncate images due to a lo
Microsoft Message Queuing Remote Code Execution Vulnerability
</code>
- [b4rt0xx/CVE-2023-21554-POC](https://github.com/b4rt0xx/CVE-2023-21554-POC)
- [Hashi0x/PoC-CVE-2023-21554](https://github.com/Hashi0x/PoC-CVE-2023-21554)
### CVE-2023-21608 (2023-01-18)