mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/06/20 14:29:12
This commit is contained in:
parent
7233808b56
commit
d5c99a9aa4
78 changed files with 979 additions and 389 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "cups-root-file-read.sh | CVE-2012-5519",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-07T15:39:47Z",
|
||||
"updated_at": "2023-06-17T01:45:30Z",
|
||||
"updated_at": "2023-06-20T06:32:27Z",
|
||||
"pushed_at": "2022-06-30T10:54:51Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": true,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-03T20:28:27Z",
|
||||
"updated_at": "2023-06-12T15:55:54Z",
|
||||
"updated_at": "2023-06-20T11:42:57Z",
|
||||
"pushed_at": "2022-10-05T07:29:14Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
|
@ -127,7 +127,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-09T20:08:56Z",
|
||||
"updated_at": "2023-02-04T05:36:07Z",
|
||||
"updated_at": "2023-06-20T11:06:37Z",
|
||||
"pushed_at": "2018-04-07T00:30:52Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 67734857,
|
||||
"name": "asa_tools",
|
||||
"full_name": "NetSPI\/asa_tools",
|
||||
"owner": {
|
||||
"login": "NetSPI",
|
||||
"id": 1713856,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1713856?v=4",
|
||||
"html_url": "https:\/\/github.com\/NetSPI"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NetSPI\/asa_tools",
|
||||
"description": "Verification tools for CVE-2016-1287",
|
||||
"fork": false,
|
||||
"created_at": "2016-09-08T19:43:18Z",
|
||||
"updated_at": "2023-05-11T14:37:27Z",
|
||||
"pushed_at": "2017-03-15T20:25:40Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 52
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2023-06-19T02:37:53Z",
|
||||
"updated_at": "2023-06-20T06:34:16Z",
|
||||
"pushed_at": "2023-01-23T13:00:34Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2023-06-17T07:34:03Z",
|
||||
"updated_at": "2023-06-20T11:38:37Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 927,
|
||||
"watchers_count": 927,
|
||||
"stargazers_count": 926,
|
||||
"watchers_count": 926,
|
||||
"has_discussions": false,
|
||||
"forks_count": 405,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 405,
|
||||
"watchers": 927,
|
||||
"watchers": 926,
|
||||
"score": 0,
|
||||
"subscribers_count": 65
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-03T03:11:24Z",
|
||||
"updated_at": "2023-06-13T06:11:37Z",
|
||||
"updated_at": "2023-06-20T13:19:23Z",
|
||||
"pushed_at": "2022-12-04T19:32:52Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T15:08:25Z",
|
||||
"updated_at": "2023-01-28T12:11:28Z",
|
||||
"updated_at": "2023-06-20T11:06:21Z",
|
||||
"pushed_at": "2018-10-18T15:11:35Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -240,7 +240,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -80,10 +80,10 @@
|
|||
"description": "CVE-2018-13379 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-24T08:49:46Z",
|
||||
"updated_at": "2022-11-22T12:08:34Z",
|
||||
"updated_at": "2023-06-20T07:06:31Z",
|
||||
"pushed_at": "2019-09-24T08:51:28Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -92,7 +92,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -119,10 +119,10 @@
|
|||
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-03T10:18:04Z",
|
||||
"updated_at": "2023-06-07T10:20:07Z",
|
||||
"updated_at": "2023-06-20T11:05:20Z",
|
||||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -131,7 +131,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2023-06-16T17:11:46Z",
|
||||
"updated_at": "2023-06-20T09:50:04Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2023-06-08T07:11:57Z",
|
||||
"updated_at": "2023-06-20T11:40:02Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 609,
|
||||
"watchers_count": 609,
|
||||
"stargazers_count": 610,
|
||||
"watchers_count": 610,
|
||||
"has_discussions": false,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"watchers": 609,
|
||||
"watchers": 610,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2023-06-18T18:32:19Z",
|
||||
"updated_at": "2023-06-20T08:56:08Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"stargazers_count": 487,
|
||||
"watchers_count": 487,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 486,
|
||||
"watchers": 487,
|
||||
"score": 0,
|
||||
"subscribers_count": 56
|
||||
},
|
||||
|
|
|
@ -2402,14 +2402,14 @@
|
|||
{
|
||||
"id": 651560536,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "Zeeshan-1234\/CVE-2018-6574",
|
||||
"full_name": "Zeeshan12340\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "Zeeshan-1234",
|
||||
"login": "Zeeshan12340",
|
||||
"id": 110278382,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110278382?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zeeshan-1234"
|
||||
"html_url": "https:\/\/github.com\/Zeeshan12340"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zeeshan-1234\/CVE-2018-6574",
|
||||
"html_url": "https:\/\/github.com\/Zeeshan12340\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T14:08:23Z",
|
||||
|
|
|
@ -2944,10 +2944,10 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2023-05-24T19:56:13Z",
|
||||
"updated_at": "2023-06-20T09:01:00Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -2956,7 +2956,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 226,
|
||||
"watchers": 227,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 198133475,
|
||||
"name": "CVE-2019-10915",
|
||||
"full_name": "jiansiting\/CVE-2019-10915",
|
||||
"owner": {
|
||||
"login": "jiansiting",
|
||||
"id": 28823754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiansiting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-10915",
|
||||
"description": "Siemens TIA administrator Tool RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-22T02:38:54Z",
|
||||
"updated_at": "2022-03-17T11:43:58Z",
|
||||
"pushed_at": "2019-07-22T11:48:39Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -223,10 +223,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-24T12:32:02Z",
|
||||
"updated_at": "2022-04-21T00:56:11Z",
|
||||
"updated_at": "2023-06-20T08:01:08Z",
|
||||
"pushed_at": "2019-10-28T10:23:17Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 198296662,
|
||||
"name": "cve-2019-11477-poc",
|
||||
"full_name": "sasqwatch\/cve-2019-11477-poc",
|
||||
"owner": {
|
||||
"login": "sasqwatch",
|
||||
"id": 22352904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22352904?v=4",
|
||||
"html_url": "https:\/\/github.com\/sasqwatch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sasqwatch\/cve-2019-11477-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-22T20:23:08Z",
|
||||
"updated_at": "2021-11-15T18:24:00Z",
|
||||
"pushed_at": "2019-07-21T15:56:43Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 197105656,
|
||||
"name": "CVE-2019-11581",
|
||||
"full_name": "jas502n\/CVE-2019-11581",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11581",
|
||||
"description": "Atlassian JIRA Template injection vulnerability RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-16T02:27:00Z",
|
||||
"updated_at": "2023-03-17T02:13:16Z",
|
||||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 198763431,
|
||||
"name": "CVE-2019-11581",
|
||||
|
|
|
@ -349,10 +349,10 @@
|
|||
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T21:11:27Z",
|
||||
"updated_at": "2023-06-18T20:27:17Z",
|
||||
"updated_at": "2023-06-20T11:38:38Z",
|
||||
"pushed_at": "2022-01-02T20:40:58Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -371,7 +371,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -479,10 +479,10 @@
|
|||
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T16:41:31Z",
|
||||
"updated_at": "2023-03-20T18:08:56Z",
|
||||
"updated_at": "2023-06-20T11:38:38Z",
|
||||
"pushed_at": "2021-11-17T14:40:14Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -491,7 +491,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Sudo exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T19:26:42Z",
|
||||
"updated_at": "2022-11-29T17:09:39Z",
|
||||
"updated_at": "2023-06-20T13:25:19Z",
|
||||
"pushed_at": "2019-10-15T20:02:57Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-06-19T15:11:03Z",
|
||||
"updated_at": "2023-06-20T08:00:29Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3789,
|
||||
"watchers_count": 3789,
|
||||
"stargazers_count": 3790,
|
||||
"watchers_count": 3790,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1084,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1084,
|
||||
"watchers": 3789,
|
||||
"watchers": 3790,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2023-06-18T10:47:55Z",
|
||||
"updated_at": "2023-06-20T13:12:52Z",
|
||||
"pushed_at": "2021-09-12T02:55:24Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 172,
|
||||
"watchers": 173,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2023-06-09T01:34:13Z",
|
||||
"updated_at": "2023-06-20T11:38:42Z",
|
||||
"pushed_at": "2023-02-06T19:18:56Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 114,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-06-19T15:11:03Z",
|
||||
"updated_at": "2023-06-20T08:00:29Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3789,
|
||||
"watchers_count": 3789,
|
||||
"stargazers_count": 3790,
|
||||
"watchers_count": 3790,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1084,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1084,
|
||||
"watchers": 3789,
|
||||
"watchers": 3790,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2023-04-08T16:31:08Z",
|
||||
"updated_at": "2023-06-20T08:52:59Z",
|
||||
"pushed_at": "2022-04-08T15:39:42Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 12,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept for privileged file read through CheckPoint SNX VPN Linux Client ",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T21:52:28Z",
|
||||
"updated_at": "2023-06-19T02:11:40Z",
|
||||
"pushed_at": "2023-06-18T22:00:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2023-06-20T09:25:50Z",
|
||||
"pushed_at": "2023-06-20T10:27:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2023-06-06T01:29:21Z",
|
||||
"updated_at": "2023-06-20T10:12:06Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 207,
|
||||
"watchers": 208,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
@ -241,13 +241,13 @@
|
|||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"forks": 116,
|
||||
"watchers": 723,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -79,19 +79,19 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2023-06-19T10:31:14Z",
|
||||
"updated_at": "2023-06-20T12:07:31Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1829,
|
||||
"watchers_count": 1829,
|
||||
"stargazers_count": 1830,
|
||||
"watchers_count": 1830,
|
||||
"has_discussions": false,
|
||||
"forks_count": 512,
|
||||
"forks_count": 511,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 512,
|
||||
"watchers": 1829,
|
||||
"forks": 511,
|
||||
"watchers": 1830,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
@ -169,7 +169,7 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2023-06-10T20:01:39Z",
|
||||
"updated_at": "2023-06-20T12:07:25Z",
|
||||
"pushed_at": "2023-05-04T19:24:39Z",
|
||||
"stargazers_count": 972,
|
||||
"watchers_count": 972,
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2023-06-18T18:03:07Z",
|
||||
"updated_at": "2023-06-20T13:16:52Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1470,
|
||||
"watchers_count": 1470,
|
||||
"stargazers_count": 1471,
|
||||
"watchers_count": 1471,
|
||||
"has_discussions": false,
|
||||
"forks_count": 487,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 487,
|
||||
"watchers": 1470,
|
||||
"watchers": 1471,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-06-16T16:04:24Z",
|
||||
"updated_at": "2023-06-20T13:59:02Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 597,
|
||||
"watchers_count": 597,
|
||||
"stargazers_count": 599,
|
||||
"watchers_count": 599,
|
||||
"has_discussions": false,
|
||||
"forks_count": 106,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 106,
|
||||
"watchers": 597,
|
||||
"watchers": 599,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Log4j 远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T15:27:38Z",
|
||||
"updated_at": "2023-06-12T12:20:53Z",
|
||||
"updated_at": "2023-06-20T07:15:42Z",
|
||||
"pushed_at": "2023-05-14T04:54:32Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -857,10 +857,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2023-06-13T06:17:25Z",
|
||||
"updated_at": "2023-06-20T09:41:45Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 896,
|
||||
"watchers_count": 896,
|
||||
"stargazers_count": 897,
|
||||
"watchers_count": 897,
|
||||
"has_discussions": false,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
|
@ -889,7 +889,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"watchers": 896,
|
||||
"watchers": 897,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-06-20T05:10:30Z",
|
||||
"updated_at": "2023-06-20T07:19:06Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1598,
|
||||
"watchers_count": 1598,
|
||||
"stargazers_count": 1599,
|
||||
"watchers_count": 1599,
|
||||
"has_discussions": false,
|
||||
"forks_count": 469,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 469,
|
||||
"watchers": 1598,
|
||||
"watchers": 1599,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-06-20T02:39:52Z",
|
||||
"updated_at": "2023-06-20T06:42:29Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 685,
|
||||
"watchers_count": 685,
|
||||
"stargazers_count": 686,
|
||||
"watchers_count": 686,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 685,
|
||||
"watchers": 686,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -3703,10 +3703,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-06-15T13:53:32Z",
|
||||
"updated_at": "2023-06-20T10:35:23Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3256,
|
||||
"watchers_count": 3256,
|
||||
"stargazers_count": 3259,
|
||||
"watchers_count": 3259,
|
||||
"has_discussions": true,
|
||||
"forks_count": 744,
|
||||
"allow_forking": true,
|
||||
|
@ -3715,7 +3715,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 744,
|
||||
"watchers": 3256,
|
||||
"watchers": 3259,
|
||||
"score": 0,
|
||||
"subscribers_count": 59
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0995 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T21:46:09Z",
|
||||
"updated_at": "2023-06-12T07:35:50Z",
|
||||
"updated_at": "2023-06-20T09:55:02Z",
|
||||
"pushed_at": "2022-03-27T09:07:01Z",
|
||||
"stargazers_count": 491,
|
||||
"watchers_count": 491,
|
||||
"stargazers_count": 492,
|
||||
"watchers_count": 492,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 491,
|
||||
"watchers": 492,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 451918204,
|
||||
"name": "CVE-2022-21371",
|
||||
"full_name": "Mr-xn\/CVE-2022-21371",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-21371",
|
||||
"description": "Oracle WebLogic Server 12.1.3.0.0 \/ 12.2.1.3.0 \/ 12.2.1.4.0 \/ 14.1.1.0.0 Local File Inclusion",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T14:50:29Z",
|
||||
"updated_at": "2023-04-20T00:39:59Z",
|
||||
"pushed_at": "2022-01-25T14:52:21Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 528880899,
|
||||
"name": "Oracle-WebLogic-CVE-2022-21371",
|
||||
|
|
|
@ -79,6 +79,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 448729790,
|
||||
"name": "CVE-2022-21907",
|
||||
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
|
||||
"owner": {
|
||||
"login": "ZZ-SOCMAP",
|
||||
"id": 98105412,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
|
||||
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T02:28:50Z",
|
||||
"updated_at": "2023-06-07T02:35:46Z",
|
||||
"pushed_at": "2022-01-20T02:07:59Z",
|
||||
"stargazers_count": 367,
|
||||
"watchers_count": 367,
|
||||
"has_discussions": false,
|
||||
"forks_count": 99,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 367,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
{
|
||||
"id": 448909871,
|
||||
"name": "CVE-2022-21907",
|
||||
|
@ -146,6 +176,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 451128086,
|
||||
"name": "CVE-2022-21907-Vulnerability-PoC",
|
||||
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
|
||||
"owner": {
|
||||
"login": "michelep",
|
||||
"id": 1425559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
|
||||
"html_url": "https:\/\/github.com\/michelep"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
|
||||
"description": "CVE-2022-21907 Vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-23T14:25:12Z",
|
||||
"updated_at": "2023-03-06T14:25:40Z",
|
||||
"pushed_at": "2022-01-23T14:28:54Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 477659433,
|
||||
"name": "CVE-2022-21907",
|
||||
|
|
|
@ -1219,10 +1219,10 @@
|
|||
"description": "Spring-Cloud-Spel-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-06T09:40:05Z",
|
||||
"updated_at": "2023-04-07T15:24:47Z",
|
||||
"updated_at": "2023-06-20T08:02:49Z",
|
||||
"pushed_at": "2022-09-16T08:00:46Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1231,7 +1231,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1316,10 +1316,10 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2023-06-16T08:36:43Z",
|
||||
"updated_at": "2023-06-20T11:51:00Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -1328,7 +1328,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -1913,10 +1913,10 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2023-06-19T02:37:53Z",
|
||||
"updated_at": "2023-06-20T06:34:16Z",
|
||||
"pushed_at": "2023-01-23T13:00:34Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -1925,7 +1925,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -2296,5 +2296,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 656168817,
|
||||
"name": "spring4shell",
|
||||
"full_name": "jakabakos\/spring4shell",
|
||||
"owner": {
|
||||
"login": "jakabakos",
|
||||
"id": 42498816,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
|
||||
"html_url": "https:\/\/github.com\/jakabakos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jakabakos\/spring4shell",
|
||||
"description": "PoC and exploit for CVE-2022-22965 Spring4Shell",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T11:45:29Z",
|
||||
"updated_at": "2023-06-20T12:12:23Z",
|
||||
"pushed_at": "2023-06-20T12:12:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 450827017,
|
||||
"name": "CVE-2022-23046",
|
||||
"full_name": "jcarabantes\/CVE-2022-23046",
|
||||
"owner": {
|
||||
"login": "jcarabantes",
|
||||
"id": 9590425,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9590425?v=4",
|
||||
"html_url": "https:\/\/github.com\/jcarabantes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jcarabantes\/CVE-2022-23046",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-22T13:35:40Z",
|
||||
"updated_at": "2022-02-16T08:00:53Z",
|
||||
"pushed_at": "2022-01-24T17:29:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 459366538,
|
||||
"name": "CVE-2022-23046",
|
||||
|
|
|
@ -47,5 +47,37 @@
|
|||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 450360735,
|
||||
"name": "CVE-2022-RCE",
|
||||
"full_name": "AlphabugX\/CVE-2022-RCE",
|
||||
"owner": {
|
||||
"login": "AlphabugX",
|
||||
"id": 27001865,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlphabugX"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE",
|
||||
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-21T05:07:59Z",
|
||||
"updated_at": "2022-11-05T22:58:02Z",
|
||||
"pushed_at": "2022-01-21T05:21:25Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Foxit PDF Reader Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-02T18:52:20Z",
|
||||
"updated_at": "2023-06-05T18:43:38Z",
|
||||
"updated_at": "2023-06-20T11:38:05Z",
|
||||
"pushed_at": "2023-02-27T04:53:11Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 115,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "unlock bootloader for theoretically ALL unisoc T7510 model",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-06-19T13:52:21Z",
|
||||
"updated_at": "2023-06-20T11:17:34Z",
|
||||
"pushed_at": "2023-06-18T10:58:23Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2023-06-15T02:40:49Z",
|
||||
"updated_at": "2023-06-20T06:28:13Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 263,
|
||||
"watchers": 264,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2023-06-05T19:50:57Z",
|
||||
"updated_at": "2023-06-20T06:34:16Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"has_discussions": false,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 318,
|
||||
"watchers": 319,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-23T10:04:58Z",
|
||||
"updated_at": "2023-06-12T14:14:27Z",
|
||||
"updated_at": "2023-06-20T08:51:16Z",
|
||||
"pushed_at": "2023-03-14T08:41:51Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 88,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-15T18:12:04Z",
|
||||
"updated_at": "2023-06-20T06:10:35Z",
|
||||
"updated_at": "2023-06-20T12:34:50Z",
|
||||
"pushed_at": "2023-06-18T21:10:39Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 144,
|
||||
"forks": 21,
|
||||
"watchers": 145,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-06-20T02:31:09Z",
|
||||
"updated_at": "2023-06-20T11:38:35Z",
|
||||
"pushed_at": "2023-02-21T04:16:19Z",
|
||||
"stargazers_count": 809,
|
||||
"watchers_count": 809,
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 586854096,
|
||||
"name": "CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"full_name": "bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"owner": {
|
||||
"login": "bAuh0lz",
|
||||
"id": 15223611,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15223611?v=4",
|
||||
"html_url": "https:\/\/github.com\/bAuh0lz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"description": "CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-09T11:44:09Z",
|
||||
"updated_at": "2023-06-09T08:36:34Z",
|
||||
"pushed_at": "2023-01-14T04:40:47Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 601937653,
|
||||
"name": "CVE-2023-0297",
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"forks": 57,
|
||||
"watchers": 330,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -148,5 +148,35 @@
|
|||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 656080043,
|
||||
"name": "CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
|
||||
"full_name": "Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
|
||||
"owner": {
|
||||
"login": "Sweelg",
|
||||
"id": 86879265,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879265?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sweelg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
|
||||
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T08:12:49Z",
|
||||
"updated_at": "2023-06-20T08:53:15Z",
|
||||
"pushed_at": "2023-06-20T08:51:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T12:22:57Z",
|
||||
"updated_at": "2023-06-20T00:14:46Z",
|
||||
"updated_at": "2023-06-20T09:53:51Z",
|
||||
"pushed_at": "2023-06-18T12:41:52Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 22,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T13:17:23Z",
|
||||
"updated_at": "2023-06-20T02:40:25Z",
|
||||
"updated_at": "2023-06-20T08:39:58Z",
|
||||
"pushed_at": "2023-06-13T14:39:17Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 165,
|
||||
"watchers": 167,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-18T10:30:49Z",
|
||||
"updated_at": "2023-06-15T21:41:47Z",
|
||||
"updated_at": "2023-06-20T11:54:22Z",
|
||||
"pushed_at": "2023-05-18T10:38:57Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 578,
|
||||
"watchers_count": 578,
|
||||
"has_discussions": false,
|
||||
"forks_count": 93,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"weblogic"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"forks": 94,
|
||||
"watchers": 578,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -35,5 +35,35 @@
|
|||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 592920759,
|
||||
"name": "CVE-2023-22960",
|
||||
"full_name": "manas3c\/CVE-2023-22960",
|
||||
"owner": {
|
||||
"login": "manas3c",
|
||||
"id": 123151924,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123151924?v=4",
|
||||
"html_url": "https:\/\/github.com\/manas3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/manas3c\/CVE-2023-22960",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T20:23:09Z",
|
||||
"updated_at": "2023-01-24T22:12:37Z",
|
||||
"pushed_at": "2023-01-24T20:23:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 597984195,
|
||||
"name": "CVE-2023-23333",
|
||||
"full_name": "Timorlover\/CVE-2023-23333",
|
||||
"owner": {
|
||||
"login": "Timorlover",
|
||||
"id": 116296194,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116296194?v=4",
|
||||
"html_url": "https:\/\/github.com\/Timorlover"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Timorlover\/CVE-2023-23333",
|
||||
"description": "There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-06T06:20:40Z",
|
||||
"updated_at": "2023-06-18T14:12:38Z",
|
||||
"pushed_at": "2023-02-06T06:35:29Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 654621817,
|
||||
"name": "CVE-2023-23333",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T11:23:44Z",
|
||||
"updated_at": "2023-06-03T10:01:23Z",
|
||||
"updated_at": "2023-06-20T09:19:54Z",
|
||||
"pushed_at": "2023-04-03T10:10:42Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-11T07:37:52Z",
|
||||
"updated_at": "2023-06-15T07:14:26Z",
|
||||
"updated_at": "2023-06-20T06:42:49Z",
|
||||
"pushed_at": "2023-06-15T01:25:03Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 156,
|
||||
"watchers": 157,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 592899217,
|
||||
"name": "CVE-2023-24055",
|
||||
"full_name": "deetl\/CVE-2023-24055",
|
||||
"owner": {
|
||||
"login": "deetl",
|
||||
"id": 50047716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50047716?v=4",
|
||||
"html_url": "https:\/\/github.com\/deetl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/deetl\/CVE-2023-24055",
|
||||
"description": "POC and Scanner for CVE-2023-24055",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T19:19:23Z",
|
||||
"updated_at": "2023-06-02T15:25:05Z",
|
||||
"pushed_at": "2023-01-25T00:04:57Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 593024753,
|
||||
"name": "CVE-2023-24055_PoC",
|
||||
|
@ -63,6 +93,72 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 595134794,
|
||||
"name": "CVE-2023-24055",
|
||||
"full_name": "ATTACKnDEFEND\/CVE-2023-24055",
|
||||
"owner": {
|
||||
"login": "ATTACKnDEFEND",
|
||||
"id": 58594630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58594630?v=4",
|
||||
"html_url": "https:\/\/github.com\/ATTACKnDEFEND"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ATTACKnDEFEND\/CVE-2023-24055",
|
||||
"description": "CVE-2023-24055 POC written in PowerShell.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T13:22:22Z",
|
||||
"updated_at": "2023-04-26T08:40:05Z",
|
||||
"pushed_at": "2023-02-04T19:44:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2023-24055",
|
||||
"cve-2023-24055-poc",
|
||||
"keepass",
|
||||
"poc",
|
||||
"proof-of-concept"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 595342543,
|
||||
"name": "PoC_CVE-2023-24055",
|
||||
"full_name": "julesbozouklian\/PoC_CVE-2023-24055",
|
||||
"owner": {
|
||||
"login": "julesbozouklian",
|
||||
"id": 26013529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26013529?v=4",
|
||||
"html_url": "https:\/\/github.com\/julesbozouklian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/julesbozouklian\/PoC_CVE-2023-24055",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T22:10:57Z",
|
||||
"updated_at": "2023-02-15T09:27:08Z",
|
||||
"pushed_at": "2023-01-31T14:36:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 599394994,
|
||||
"name": "KeePass-TriggerLess",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-24078 for FuguHub \/ BarracudaDrive",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-17T10:11:24Z",
|
||||
"updated_at": "2023-06-19T15:01:58Z",
|
||||
"updated_at": "2023-06-20T09:13:22Z",
|
||||
"pushed_at": "2023-06-17T10:11:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 598673740,
|
||||
"name": "jfrog-CVE-2023-25136-OpenSSH_Double-Free",
|
||||
"full_name": "jfrog\/jfrog-CVE-2023-25136-OpenSSH_Double-Free",
|
||||
"owner": {
|
||||
"login": "jfrog",
|
||||
"id": 499942,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499942?v=4",
|
||||
"html_url": "https:\/\/github.com\/jfrog"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jfrog\/jfrog-CVE-2023-25136-OpenSSH_Double-Free",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T15:33:41Z",
|
||||
"updated_at": "2023-06-13T04:31:21Z",
|
||||
"pushed_at": "2023-02-09T09:06:15Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 601784074,
|
||||
"name": "CVE-2023-25136",
|
||||
|
|
|
@ -114,13 +114,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 599535214,
|
||||
"name": "CVE-2023-25194",
|
||||
"full_name": "ohnonoyesyes\/CVE-2023-25194",
|
||||
"owner": {
|
||||
"login": "ohnonoyesyes",
|
||||
"id": 93457304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4",
|
||||
"html_url": "https:\/\/github.com\/ohnonoyesyes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2023-25194",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-09T10:49:46Z",
|
||||
"updated_at": "2023-06-09T08:35:28Z",
|
||||
"pushed_at": "2023-02-09T11:00:26Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 640837167,
|
||||
"name": "Flink-Kafka-Vul",
|
||||
|
|
|
@ -52,7 +52,7 @@
|
|||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -66,7 +66,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 20,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for Veeam Backup and Replication CVE-2023-27532",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-18T16:20:53Z",
|
||||
"updated_at": "2023-06-10T06:45:55Z",
|
||||
"updated_at": "2023-06-20T09:21:00Z",
|
||||
"pushed_at": "2023-03-28T18:21:55Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC FortiOS SSL-VPN buffer overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T11:00:54Z",
|
||||
"updated_at": "2023-06-20T01:34:24Z",
|
||||
"updated_at": "2023-06-20T07:43:59Z",
|
||||
"pushed_at": "2023-06-13T10:26:25Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -103,19 +103,19 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T20:15:36Z",
|
||||
"updated_at": "2023-06-20T04:52:19Z",
|
||||
"updated_at": "2023-06-20T08:10:50Z",
|
||||
"pushed_at": "2023-06-19T21:20:09Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -111,13 +111,13 @@
|
|||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-27T08:53:04Z",
|
||||
"updated_at": "2023-06-19T02:57:50Z",
|
||||
"updated_at": "2023-06-20T12:41:14Z",
|
||||
"pushed_at": "2023-04-04T05:26:59Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,8 +27,8 @@
|
|||
"minio"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 213,
|
||||
"forks": 34,
|
||||
"watchers": 214,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "PoC repository for CVE-2023-29007",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-26T14:00:11Z",
|
||||
"updated_at": "2023-06-12T21:57:39Z",
|
||||
"updated_at": "2023-06-20T07:24:50Z",
|
||||
"pushed_at": "2023-04-26T14:21:51Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"cve"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 27,
|
||||
"forks": 12,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-06-07T07:51:59Z",
|
||||
"updated_at": "2023-06-07T07:51:59Z",
|
||||
"pushed_at": "2023-06-19T14:34:34Z",
|
||||
"pushed_at": "2023-06-20T07:42:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-06-19T12:57:43Z",
|
||||
"updated_at": "2023-06-19T12:57:44Z",
|
||||
"pushed_at": "2023-06-19T15:24:13Z",
|
||||
"pushed_at": "2023-06-20T07:50:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T11:14:08Z",
|
||||
"updated_at": "2023-06-20T03:35:13Z",
|
||||
"updated_at": "2023-06-20T13:08:26Z",
|
||||
"pushed_at": "2023-06-18T11:51:54Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 87,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -228,13 +228,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "PowerJob V4.3.1 Unauthorized Vulnerability Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-29T05:48:35Z",
|
||||
"updated_at": "2023-05-29T16:53:26Z",
|
||||
"updated_at": "2023-06-20T08:27:03Z",
|
||||
"pushed_at": "2023-05-29T05:51:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -330,34 +330,34 @@
|
|||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 654932490,
|
||||
"name": "CVE-2023-30212-Vulnerable-Lab",
|
||||
"full_name": "AAsh035\/CVE-2023-30212-Vulnerable-Lab",
|
||||
"id": 654942843,
|
||||
"name": "CVE-2023-30212-Vulnerable-Lab-xjghb",
|
||||
"full_name": "hheeyywweellccoommee\/CVE-2023-30212-Vulnerable-Lab-xjghb",
|
||||
"owner": {
|
||||
"login": "AAsh035",
|
||||
"id": 136836668,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136836668?v=4",
|
||||
"html_url": "https:\/\/github.com\/AAsh035"
|
||||
"login": "hheeyywweellccoommee",
|
||||
"id": 131327252,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131327252?v=4",
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AAsh035\/CVE-2023-30212-Vulnerable-Lab",
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee\/CVE-2023-30212-Vulnerable-Lab-xjghb",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-17T11:21:09Z",
|
||||
"updated_at": "2023-06-17T11:28:19Z",
|
||||
"pushed_at": "2023-06-18T15:22:19Z",
|
||||
"created_at": "2023-06-17T12:01:21Z",
|
||||
"updated_at": "2023-06-20T12:02:25Z",
|
||||
"pushed_at": "2023-06-17T11:28:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 655408234,
|
||||
|
@ -404,7 +404,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-06-19T16:30:05Z",
|
||||
"updated_at": "2023-06-19T16:30:06Z",
|
||||
"pushed_at": "2023-06-19T18:04:27Z",
|
||||
"pushed_at": "2023-06-20T14:20:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -418,5 +418,125 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 656082480,
|
||||
"name": "Vulnerable-Docker-CVE-2023-30212",
|
||||
"full_name": "VisDev23\/Vulnerable-Docker-CVE-2023-30212",
|
||||
"owner": {
|
||||
"login": "VisDev23",
|
||||
"id": 110278049,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110278049?v=4",
|
||||
"html_url": "https:\/\/github.com\/VisDev23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VisDev23\/Vulnerable-Docker-CVE-2023-30212",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T08:18:43Z",
|
||||
"updated_at": "2023-06-20T08:18:43Z",
|
||||
"pushed_at": "2023-06-20T08:20:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 656103481,
|
||||
"name": "Vulnerable-Docker--CVE-2023-30212-",
|
||||
"full_name": "VisDev23\/Vulnerable-Docker--CVE-2023-30212-",
|
||||
"owner": {
|
||||
"login": "VisDev23",
|
||||
"id": 110278049,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110278049?v=4",
|
||||
"html_url": "https:\/\/github.com\/VisDev23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VisDev23\/Vulnerable-Docker--CVE-2023-30212-",
|
||||
"description": "This contains the necessary files and Docker to replicate A vulnerability in OURPHP that has a XSS Vulnerability (CVE-2023-30212)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T09:08:38Z",
|
||||
"updated_at": "2023-06-20T13:33:54Z",
|
||||
"pushed_at": "2023-06-20T13:33:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 656147934,
|
||||
"name": "CVE-2023-30212",
|
||||
"full_name": "AAsh035\/CVE-2023-30212",
|
||||
"owner": {
|
||||
"login": "AAsh035",
|
||||
"id": 136836668,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136836668?v=4",
|
||||
"html_url": "https:\/\/github.com\/AAsh035"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AAsh035\/CVE-2023-30212",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T10:50:30Z",
|
||||
"updated_at": "2023-06-20T11:17:35Z",
|
||||
"pushed_at": "2023-06-20T13:32:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 656182607,
|
||||
"name": "Creating-a-Vulnerable-Docker-Environment-CVE-2023-30212-",
|
||||
"full_name": "JasaluRah\/Creating-a-Vulnerable-Docker-Environment-CVE-2023-30212-",
|
||||
"owner": {
|
||||
"login": "JasaluRah",
|
||||
"id": 136897118,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136897118?v=4",
|
||||
"html_url": "https:\/\/github.com\/JasaluRah"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JasaluRah\/Creating-a-Vulnerable-Docker-Environment-CVE-2023-30212-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T12:20:20Z",
|
||||
"updated_at": "2023-06-20T13:01:30Z",
|
||||
"pushed_at": "2023-06-20T13:37:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"forks": 62,
|
||||
"watchers": 249,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
@ -74,7 +74,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-16T05:58:03Z",
|
||||
"updated_at": "2023-06-15T17:33:36Z",
|
||||
"pushed_at": "2023-06-20T03:33:50Z",
|
||||
"pushed_at": "2023-06-20T06:58:04Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 22,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T02:18:29Z",
|
||||
"updated_at": "2023-06-19T09:04:28Z",
|
||||
"updated_at": "2023-06-20T07:22:18Z",
|
||||
"pushed_at": "2023-05-30T02:43:06Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-01T14:48:26Z",
|
||||
"updated_at": "2023-06-19T12:01:16Z",
|
||||
"updated_at": "2023-06-20T07:44:20Z",
|
||||
"pushed_at": "2023-06-07T13:07:30Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 45,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "MOVEit CVE-2023-34362",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T19:07:32Z",
|
||||
"updated_at": "2023-06-20T00:38:11Z",
|
||||
"updated_at": "2023-06-20T10:01:07Z",
|
||||
"pushed_at": "2023-06-12T11:29:46Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 72,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
110
README.md
110
README.md
|
@ -1,6 +1,14 @@
|
|||
# PoC in GitHub
|
||||
|
||||
## 2023
|
||||
### CVE-2023-0045 (2023-04-25)
|
||||
|
||||
<code>The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n
|
||||
</code>
|
||||
|
||||
- [ASkyeye/CVE-2023-0045](https://github.com/ASkyeye/CVE-2023-0045)
|
||||
- [es0j/CVE-2023-0045](https://github.com/es0j/CVE-2023-0045)
|
||||
|
||||
### CVE-2023-0050 (2023-03-09)
|
||||
|
||||
<code>An issue has been discovered in GitLab affecting all versions starting from 13.7 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A specially crafted Kroki diagram could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims.
|
||||
|
@ -39,10 +47,18 @@
|
|||
<code>Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
|
||||
</code>
|
||||
|
||||
- [bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad](https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad)
|
||||
- [Small-ears/CVE-2023-0297](https://github.com/Small-ears/CVE-2023-0297)
|
||||
- [JacobEbben/CVE-2023-0297](https://github.com/JacobEbben/CVE-2023-0297)
|
||||
- [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297)
|
||||
|
||||
### CVE-2023-0315 (2023-01-15)
|
||||
|
||||
<code>Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8.
|
||||
</code>
|
||||
|
||||
- [mhaskar/CVE-2023-0315](https://github.com/mhaskar/CVE-2023-0315)
|
||||
|
||||
### CVE-2023-0386 (2023-03-22)
|
||||
|
||||
<code>A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
|
||||
|
@ -156,6 +172,7 @@
|
|||
- [CKevens/CVE-2023-1454-EXP](https://github.com/CKevens/CVE-2023-1454-EXP)
|
||||
- [BugFor-Pings/CVE-2023-1454](https://github.com/BugFor-Pings/CVE-2023-1454)
|
||||
- [padbergpete47/CVE-2023-1454](https://github.com/padbergpete47/CVE-2023-1454)
|
||||
- [Sweelg/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln](https://github.com/Sweelg/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln)
|
||||
|
||||
### CVE-2023-1665 (2023-03-27)
|
||||
|
||||
|
@ -433,6 +450,13 @@
|
|||
- [JMousqueton/CVE-2023-21716](https://github.com/JMousqueton/CVE-2023-21716)
|
||||
- [Lord-of-the-IoT/CVE-2023-21716](https://github.com/Lord-of-the-IoT/CVE-2023-21716)
|
||||
|
||||
### CVE-2023-21739 (2023-01-10)
|
||||
|
||||
<code>Windows Bluetooth Driver Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2023-21739](https://github.com/gmh5225/CVE-2023-21739)
|
||||
|
||||
### CVE-2023-21742 (2023-01-10)
|
||||
|
||||
<code>Microsoft SharePoint Server Remote Code Execution Vulnerability
|
||||
|
@ -440,6 +464,13 @@
|
|||
|
||||
- [ohnonoyesyes/CVE-2023-21742](https://github.com/ohnonoyesyes/CVE-2023-21742)
|
||||
|
||||
### CVE-2023-21752 (2023-01-10)
|
||||
|
||||
<code>Windows Backup Service Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Wh04m1001/CVE-2023-21752](https://github.com/Wh04m1001/CVE-2023-21752)
|
||||
|
||||
### CVE-2023-21768 (2023-01-10)
|
||||
|
||||
<code>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
|
||||
|
@ -544,6 +575,7 @@
|
|||
</code>
|
||||
|
||||
- [t3l3machus/CVE-2023-22960](https://github.com/t3l3machus/CVE-2023-22960)
|
||||
- [manas3c/CVE-2023-22960](https://github.com/manas3c/CVE-2023-22960)
|
||||
|
||||
### CVE-2023-22974 (2023-02-22)
|
||||
|
||||
|
@ -582,6 +614,7 @@
|
|||
<code>There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
|
||||
</code>
|
||||
|
||||
- [Timorlover/CVE-2023-23333](https://github.com/Timorlover/CVE-2023-23333)
|
||||
- [Mr-xn/CVE-2023-23333](https://github.com/Mr-xn/CVE-2023-23333)
|
||||
|
||||
### CVE-2023-23396 (2023-03-14)
|
||||
|
@ -674,16 +707,33 @@
|
|||
- [wibuheker/Joomla-CVE-2023-23752](https://github.com/wibuheker/Joomla-CVE-2023-23752)
|
||||
- [Sweelg/CVE-2023-23752](https://github.com/Sweelg/CVE-2023-23752)
|
||||
|
||||
### CVE-2023-23924 (2023-01-31)
|
||||
|
||||
<code>Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
|
||||
</code>
|
||||
|
||||
- [motikan2010/CVE-2023-23924](https://github.com/motikan2010/CVE-2023-23924)
|
||||
|
||||
### CVE-2023-24055 (2023-01-21)
|
||||
|
||||
<code>** DISPUTED ** KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
|
||||
</code>
|
||||
|
||||
- [deetl/CVE-2023-24055](https://github.com/deetl/CVE-2023-24055)
|
||||
- [alt3kx/CVE-2023-24055_PoC](https://github.com/alt3kx/CVE-2023-24055_PoC)
|
||||
- [Cyb3rtus/keepass_CVE-2023-24055_yara_rule](https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule)
|
||||
- [ATTACKnDEFEND/CVE-2023-24055](https://github.com/ATTACKnDEFEND/CVE-2023-24055)
|
||||
- [julesbozouklian/PoC_CVE-2023-24055](https://github.com/julesbozouklian/PoC_CVE-2023-24055)
|
||||
- [digital-dev/KeePass-TriggerLess](https://github.com/digital-dev/KeePass-TriggerLess)
|
||||
- [zwlsix/KeePass-CVE-2023-24055](https://github.com/zwlsix/KeePass-CVE-2023-24055)
|
||||
|
||||
### CVE-2023-24059 (2023-01-22)
|
||||
|
||||
<code>Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2023-24059](https://github.com/gmh5225/CVE-2023-24059)
|
||||
|
||||
### CVE-2023-24078 (2023-02-17)
|
||||
|
||||
<code>Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/.
|
||||
|
@ -702,6 +752,13 @@
|
|||
### CVE-2023-24362
|
||||
- [cavetownie/CVE-2023-24362](https://github.com/cavetownie/CVE-2023-24362)
|
||||
|
||||
### CVE-2023-24610 (2023-02-01)
|
||||
|
||||
<code>NOSH 4a5cfdb allows remote authenticated users to execute PHP arbitrary code via the "practice logo" upload feature. The client-side checks can be bypassed. This may allow attackers to steal Protected Health Information because the product is for health charting.
|
||||
</code>
|
||||
|
||||
- [abbisQQ/CVE-2023-24610](https://github.com/abbisQQ/CVE-2023-24610)
|
||||
|
||||
### CVE-2023-24709 (2023-03-21)
|
||||
|
||||
<code>An issue found in Paradox Security Systems IPR512 allows attackers to cause a denial of service via the login.html and login.xml parameters.
|
||||
|
@ -731,6 +788,7 @@
|
|||
<code>OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
|
||||
</code>
|
||||
|
||||
- [jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free](https://github.com/jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free)
|
||||
- [ticofookfook/CVE-2023-25136](https://github.com/ticofookfook/CVE-2023-25136)
|
||||
- [Christbowel/CVE-2023-25136](https://github.com/Christbowel/CVE-2023-25136)
|
||||
- [adhikara13/CVE-2023-25136](https://github.com/adhikara13/CVE-2023-25136)
|
||||
|
@ -753,6 +811,7 @@
|
|||
<code>A possible security vulnerability has been identified in Apache Kafka Connect. This requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka 2.3.0. When configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.JndiLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath. Since Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box configurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector client override policy that permits them. Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0. We advise the Kafka Connect users to validate connector configurations and only allow trusted JNDI configurations. Also examine connector dependencies for vulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally, in addition to leveraging the "org.apache.kafka.disallowed.login.modules" system property, Kafka Connect users can also implement their own connector client config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.
|
||||
</code>
|
||||
|
||||
- [ohnonoyesyes/CVE-2023-25194](https://github.com/ohnonoyesyes/CVE-2023-25194)
|
||||
- [Veraxy00/Flink-Kafka-Vul](https://github.com/Veraxy00/Flink-Kafka-Vul)
|
||||
|
||||
### CVE-2023-25234 (2023-02-27)
|
||||
|
@ -1262,9 +1321,13 @@
|
|||
- [libas7994/Exploit-the-CVE-2023-30212-vulnerability](https://github.com/libas7994/Exploit-the-CVE-2023-30212-vulnerability)
|
||||
- [libasv/Exploite-CVE-2023-30212-vulnerability](https://github.com/libasv/Exploite-CVE-2023-30212-vulnerability)
|
||||
- [kai-iszz/CVE-2023-30212](https://github.com/kai-iszz/CVE-2023-30212)
|
||||
- [AAsh035/CVE-2023-30212-Vulnerable-Lab](https://github.com/AAsh035/CVE-2023-30212-Vulnerable-Lab)
|
||||
- [hheeyywweellccoommee/CVE-2023-30212-Vulnerable-Lab-xjghb](https://github.com/hheeyywweellccoommee/CVE-2023-30212-Vulnerable-Lab-xjghb)
|
||||
- [MaThEw-ViNcEnT/CVE-2023-30212-OURPHP-Vulnerability](https://github.com/MaThEw-ViNcEnT/CVE-2023-30212-OURPHP-Vulnerability)
|
||||
- [arunsnap/CVE-2023-30212-POC](https://github.com/arunsnap/CVE-2023-30212-POC)
|
||||
- [VisDev23/Vulnerable-Docker-CVE-2023-30212](https://github.com/VisDev23/Vulnerable-Docker-CVE-2023-30212)
|
||||
- [VisDev23/Vulnerable-Docker--CVE-2023-30212-](https://github.com/VisDev23/Vulnerable-Docker--CVE-2023-30212-)
|
||||
- [AAsh035/CVE-2023-30212](https://github.com/AAsh035/CVE-2023-30212)
|
||||
- [JasaluRah/Creating-a-Vulnerable-Docker-Environment-CVE-2023-30212-](https://github.com/JasaluRah/Creating-a-Vulnerable-Docker-Environment-CVE-2023-30212-)
|
||||
|
||||
### CVE-2023-30256 (2023-05-11)
|
||||
|
||||
|
@ -1716,6 +1779,13 @@
|
|||
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
|
||||
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
|
||||
|
||||
### CVE-2022-0219 (2022-01-20)
|
||||
|
||||
<code>Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
|
||||
</code>
|
||||
|
||||
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
|
||||
|
||||
### CVE-2022-0236 (2022-01-18)
|
||||
|
||||
<code>The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
|
||||
|
@ -2877,6 +2947,7 @@
|
|||
<code>Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
||||
</code>
|
||||
|
||||
- [Mr-xn/CVE-2022-21371](https://github.com/Mr-xn/CVE-2022-21371)
|
||||
- [Vulnmachines/Oracle-WebLogic-CVE-2022-21371](https://github.com/Vulnmachines/Oracle-WebLogic-CVE-2022-21371)
|
||||
|
||||
### CVE-2022-21449 (2022-04-19)
|
||||
|
@ -2903,6 +2974,13 @@
|
|||
- [Zh1z3ven/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/Zh1z3ven/Oracle-E-BS-CVE-2022-21587-Exploit)
|
||||
- [sahabrifki/CVE-2022-21587-Oracle-EBS-](https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS-)
|
||||
|
||||
### CVE-2022-21658 (2022-01-20)
|
||||
|
||||
<code>Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
|
||||
</code>
|
||||
|
||||
- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
|
||||
|
||||
### CVE-2022-21660 (2022-02-09)
|
||||
|
||||
<code>Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
|
||||
|
@ -2998,8 +3076,10 @@
|
|||
|
||||
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
|
||||
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
|
||||
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
|
||||
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
|
||||
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
|
||||
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
|
||||
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
|
||||
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
|
||||
- [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys)
|
||||
|
@ -3068,6 +3148,13 @@
|
|||
- [pwneddr/Sonic_CVE-2022-22274_poc](https://github.com/pwneddr/Sonic_CVE-2022-22274_poc)
|
||||
- [forthisvideo/CVE-2022-22274_poc](https://github.com/forthisvideo/CVE-2022-22274_poc)
|
||||
|
||||
### CVE-2022-22296 (2022-01-24)
|
||||
|
||||
<code>Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
|
||||
</code>
|
||||
|
||||
- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
|
||||
|
||||
### CVE-2022-22536 (2022-02-09)
|
||||
|
||||
<code>SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.
|
||||
|
@ -3411,6 +3498,7 @@
|
|||
- [bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-](https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-)
|
||||
- [BKLockly/CVE-2022-22965](https://github.com/BKLockly/CVE-2022-22965)
|
||||
- [dbgee/Spring4Shell](https://github.com/dbgee/Spring4Shell)
|
||||
- [jakabakos/spring4shell](https://github.com/jakabakos/spring4shell)
|
||||
|
||||
### CVE-2022-22966 (2022-04-14)
|
||||
|
||||
|
@ -3477,6 +3565,7 @@
|
|||
<code>PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
|
||||
</code>
|
||||
|
||||
- [jcarabantes/CVE-2022-23046](https://github.com/jcarabantes/CVE-2022-23046)
|
||||
- [dnr6419/CVE-2022-23046](https://github.com/dnr6419/CVE-2022-23046)
|
||||
- [hadrian3689/phpipam_1.4.4](https://github.com/hadrian3689/phpipam_1.4.4)
|
||||
- [bernauers/CVE-2022-23046](https://github.com/bernauers/CVE-2022-23046)
|
||||
|
@ -3552,6 +3641,7 @@
|
|||
</code>
|
||||
|
||||
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
|
||||
- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE)
|
||||
|
||||
### CVE-2022-23342 (2022-06-21)
|
||||
|
||||
|
@ -20708,13 +20798,6 @@
|
|||
|
||||
- [KTN1990/CVE-2019-10869](https://github.com/KTN1990/CVE-2019-10869)
|
||||
|
||||
### CVE-2019-10915 (2019-07-11)
|
||||
|
||||
<code>A vulnerability has been identified in TIA Administrator (All versions < V1.0 SP1 Upd1). The integrated configuration web application (TIA Administrator) allows to execute certain application commands without proper authentication. The vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
||||
</code>
|
||||
|
||||
- [jiansiting/CVE-2019-10915](https://github.com/jiansiting/CVE-2019-10915)
|
||||
|
||||
### CVE-2019-10945 (2019-04-10)
|
||||
|
||||
<code>An issue was discovered in Joomla! before 3.9.5. The Media Manager component does not properly sanitize the folder parameter, allowing attackers to act outside the media manager root directory.
|
||||
|
@ -20816,13 +20899,6 @@
|
|||
- [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447)
|
||||
- [0xkasra/CVE-2019-11447](https://github.com/0xkasra/CVE-2019-11447)
|
||||
|
||||
### CVE-2019-11477 (2019-06-18)
|
||||
|
||||
<code>Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
|
||||
</code>
|
||||
|
||||
- [sasqwatch/cve-2019-11477-poc](https://github.com/sasqwatch/cve-2019-11477-poc)
|
||||
|
||||
### CVE-2019-11510 (2019-05-08)
|
||||
|
||||
<code>In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
|
||||
|
@ -20869,7 +20945,6 @@
|
|||
<code>There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
|
||||
</code>
|
||||
|
||||
- [jas502n/CVE-2019-11581](https://github.com/jas502n/CVE-2019-11581)
|
||||
- [kobs0N/CVE-2019-11581](https://github.com/kobs0N/CVE-2019-11581)
|
||||
- [PetrusViet/CVE-2019-11581](https://github.com/PetrusViet/CVE-2019-11581)
|
||||
|
||||
|
@ -23632,7 +23707,7 @@
|
|||
- [Yealid/CVE-2018-6574](https://github.com/Yealid/CVE-2018-6574)
|
||||
- [jahwni/CVE-2018-6574](https://github.com/jahwni/CVE-2018-6574)
|
||||
- [Guest-user1/CVE-2018-6574](https://github.com/Guest-user1/CVE-2018-6574)
|
||||
- [Zeeshan-1234/CVE-2018-6574](https://github.com/Zeeshan-1234/CVE-2018-6574)
|
||||
- [Zeeshan12340/CVE-2018-6574](https://github.com/Zeeshan12340/CVE-2018-6574)
|
||||
|
||||
### CVE-2018-6622 (2018-08-17)
|
||||
|
||||
|
@ -28302,6 +28377,7 @@
|
|||
</code>
|
||||
|
||||
- [jgajek/killasa](https://github.com/jgajek/killasa)
|
||||
- [NetSPI/asa_tools](https://github.com/NetSPI/asa_tools)
|
||||
|
||||
### CVE-2016-1494 (2016-01-13)
|
||||
|
||||
|
|
Loading…
Reference in a new issue