mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/05/12 00:31:33
This commit is contained in:
parent
8a86a0674d
commit
d6168ef260
24 changed files with 521 additions and 28 deletions
|
@ -143,5 +143,34 @@
|
|||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 340543198,
|
||||
"name": "CVE-2018-0802",
|
||||
"full_name": "roninAPT\/CVE-2018-0802",
|
||||
"owner": {
|
||||
"login": "roninAPT",
|
||||
"id": 77648833,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77648833?v=4",
|
||||
"html_url": "https:\/\/github.com\/roninAPT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/roninAPT\/CVE-2018-0802",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-20T02:34:16Z",
|
||||
"updated_at": "2021-02-20T02:34:27Z",
|
||||
"pushed_at": "2021-02-20T02:34:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2018/CVE-2018-13797.json
Normal file
31
2018/CVE-2018-13797.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 327091489,
|
||||
"name": "CVE-2018-13797",
|
||||
"full_name": "dsp-testing\/CVE-2018-13797",
|
||||
"owner": {
|
||||
"login": "dsp-testing",
|
||||
"id": 30846345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30846345?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsp-testing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-13797",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T18:56:56Z",
|
||||
"updated_at": "2021-01-05T19:33:04Z",
|
||||
"pushed_at": "2021-01-05T19:33:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1420,6 +1420,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 358086744,
|
||||
"name": "test-CVE-2018-6574-",
|
||||
"full_name": "MohamedTarekq\/test-CVE-2018-6574-",
|
||||
"owner": {
|
||||
"login": "MohamedTarekq",
|
||||
"id": 54548283,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54548283?v=4",
|
||||
"html_url": "https:\/\/github.com\/MohamedTarekq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MohamedTarekq\/test-CVE-2018-6574-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T01:10:43Z",
|
||||
"updated_at": "2021-04-15T01:15:13Z",
|
||||
"pushed_at": "2021-04-15T01:15:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 377097654,
|
||||
"name": "CVE-2018-6574",
|
||||
|
|
|
@ -318,6 +318,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354695794,
|
||||
"name": "CVE-2018-8174_EXP",
|
||||
"full_name": "delina1\/CVE-2018-8174_EXP",
|
||||
"owner": {
|
||||
"login": "delina1",
|
||||
"id": 81941054,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81941054?v=4",
|
||||
"html_url": "https:\/\/github.com\/delina1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/delina1\/CVE-2018-8174_EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T02:31:54Z",
|
||||
"updated_at": "2021-04-05T02:31:54Z",
|
||||
"pushed_at": "2021-04-05T02:31:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 370609005,
|
||||
"name": "CVE-2018-8174_EXP",
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -434,6 +434,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 391941607,
|
||||
"name": "CVE-2020-27955-LFS-main",
|
||||
"full_name": "whitetea2424\/CVE-2020-27955-LFS-main",
|
||||
"owner": {
|
||||
"login": "whitetea2424",
|
||||
"id": 80032455,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80032455?v=4",
|
||||
"html_url": "https:\/\/github.com\/whitetea2424"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whitetea2424\/CVE-2020-27955-LFS-main",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T12:32:08Z",
|
||||
"updated_at": "2021-08-02T13:13:28Z",
|
||||
"pushed_at": "2021-08-02T13:13:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 481308105,
|
||||
"name": "cve-2020-27955",
|
||||
|
|
|
@ -32,5 +32,34 @@
|
|||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390319299,
|
||||
"name": "CVE-2020-28502",
|
||||
"full_name": "dpredrag\/CVE-2020-28502",
|
||||
"owner": {
|
||||
"login": "dpredrag",
|
||||
"id": 3372646,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3372646?v=4",
|
||||
"html_url": "https:\/\/github.com\/dpredrag"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dpredrag\/CVE-2020-28502",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-28T11:01:56Z",
|
||||
"updated_at": "2021-07-28T11:03:19Z",
|
||||
"pushed_at": "2021-07-28T11:03:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2020/CVE-2020-35545.json
Normal file
31
2020/CVE-2020-35545.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 389169410,
|
||||
"name": "CVE-2020-35545",
|
||||
"full_name": "bousalman\/CVE-2020-35545",
|
||||
"owner": {
|
||||
"login": "bousalman",
|
||||
"id": 16021440,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16021440?v=4",
|
||||
"html_url": "https:\/\/github.com\/bousalman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bousalman\/CVE-2020-35545",
|
||||
"description": "Spotweb 1.4.9 - 'search' SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-24T18:12:35Z",
|
||||
"updated_at": "2021-07-24T18:13:12Z",
|
||||
"pushed_at": "2021-07-24T18:13:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
60
2020/CVE-2020-35846.json
Normal file
60
2020/CVE-2020-35846.json
Normal file
|
@ -0,0 +1,60 @@
|
|||
[
|
||||
{
|
||||
"id": 389266363,
|
||||
"name": "CVE-2020-35846",
|
||||
"full_name": "JohnHammond\/CVE-2020-35846",
|
||||
"owner": {
|
||||
"login": "JohnHammond",
|
||||
"id": 6288722,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
|
||||
"html_url": "https:\/\/github.com\/JohnHammond"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2020-35846",
|
||||
"description": "Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-25T05:05:14Z",
|
||||
"updated_at": "2023-03-23T22:42:57Z",
|
||||
"pushed_at": "2021-07-25T05:28:51Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 393142417,
|
||||
"name": "CVE-2020-35846",
|
||||
"full_name": "0z09e\/CVE-2020-35846",
|
||||
"owner": {
|
||||
"login": "0z09e",
|
||||
"id": 62566206,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62566206?v=4",
|
||||
"html_url": "https:\/\/github.com\/0z09e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0z09e\/CVE-2020-35846",
|
||||
"description": "Cockpit CMS 0.11.1 NoSQL Injection to Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-05T18:48:52Z",
|
||||
"updated_at": "2023-05-04T13:41:46Z",
|
||||
"pushed_at": "2021-08-06T14:00:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
38
2020/CVE-2020-36287.json
Normal file
38
2020/CVE-2020-36287.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"id": 391787530,
|
||||
"name": "CVE-2020-36287",
|
||||
"full_name": "f4rber\/CVE-2020-36287",
|
||||
"owner": {
|
||||
"login": "f4rber",
|
||||
"id": 53954664,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53954664?v=4",
|
||||
"html_url": "https:\/\/github.com\/f4rber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/f4rber\/CVE-2020-36287",
|
||||
"description": "The dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server and Jira Data Center before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to obtain gadget related settings via a missing permissions check.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T01:52:39Z",
|
||||
"updated_at": "2023-03-30T02:40:48Z",
|
||||
"pushed_at": "2021-08-08T16:26:11Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"atlassian",
|
||||
"bruteforce",
|
||||
"cve-2020-36287",
|
||||
"enumeration",
|
||||
"jira",
|
||||
"python3"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390551926,
|
||||
"name": "CVE-2020-5248",
|
||||
"full_name": "Mkway\/CVE-2020-5248",
|
||||
"owner": {
|
||||
"login": "Mkway",
|
||||
"id": 34364080,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34364080?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mkway"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mkway\/CVE-2020-5248",
|
||||
"description": "CVE-2020-5248",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T00:46:26Z",
|
||||
"updated_at": "2021-07-29T04:13:11Z",
|
||||
"pushed_at": "2021-07-29T04:13:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 387366849,
|
||||
"name": "CVE-2020-9483",
|
||||
"full_name": "Neko-chanQwQ\/CVE-2020-9483",
|
||||
"owner": {
|
||||
"login": "Neko-chanQwQ",
|
||||
"id": 83222283,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4",
|
||||
"html_url": "https:\/\/github.com\/Neko-chanQwQ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Neko-chanQwQ\/CVE-2020-9483",
|
||||
"description": "PoC of SQL Injection vul(CVE-2020-9483,Apache SkyWalking)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-19T06:50:17Z",
|
||||
"updated_at": "2022-11-09T18:13:00Z",
|
||||
"pushed_at": "2021-07-19T07:01:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -173,6 +173,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 392581141,
|
||||
"name": "CVE-2020-9496",
|
||||
"full_name": "s4dbrd\/CVE-2020-9496",
|
||||
"owner": {
|
||||
"login": "s4dbrd",
|
||||
"id": 79448708,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79448708?v=4",
|
||||
"html_url": "https:\/\/github.com\/s4dbrd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s4dbrd\/CVE-2020-9496",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-04T06:48:31Z",
|
||||
"updated_at": "2022-06-18T16:23:06Z",
|
||||
"pushed_at": "2021-08-04T06:49:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 525091869,
|
||||
"name": "CVE-2020-9496",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2023-04-21T00:11:38Z",
|
||||
"updated_at": "2023-05-11T19:04:12Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1898,5 +1898,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 639593327,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "mutur4\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "mutur4",
|
||||
"id": 68686790,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68686790?v=4",
|
||||
"html_url": "https:\/\/github.com\/mutur4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mutur4\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-11T19:38:16Z",
|
||||
"updated_at": "2023-05-11T19:41:47Z",
|
||||
"pushed_at": "2023-05-11T19:45:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -143,13 +143,13 @@
|
|||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"forks": 53,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -913,7 +913,7 @@
|
|||
"stargazers_count": 778,
|
||||
"watchers_count": 778,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -921,7 +921,7 @@
|
|||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"forks": 166,
|
||||
"watchers": 778,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -3613,10 +3613,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-05-11T14:24:54Z",
|
||||
"updated_at": "2023-05-11T23:40:46Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3243,
|
||||
"watchers_count": 3243,
|
||||
"stargazers_count": 3242,
|
||||
"watchers_count": 3242,
|
||||
"has_discussions": true,
|
||||
"forks_count": 744,
|
||||
"allow_forking": true,
|
||||
|
@ -3625,7 +3625,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 744,
|
||||
"watchers": 3243,
|
||||
"watchers": 3242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2023-05-08T16:37:44Z",
|
||||
"updated_at": "2023-05-11T19:01:49Z",
|
||||
"pushed_at": "2022-12-13T15:26:57Z",
|
||||
"stargazers_count": 375,
|
||||
"watchers_count": 375,
|
||||
"stargazers_count": 376,
|
||||
"watchers_count": 376,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 375,
|
||||
"watchers": 376,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-12-20T08:17:05Z",
|
||||
"updated_at": "2023-03-24T15:19:25Z",
|
||||
"updated_at": "2023-05-11T20:43:33Z",
|
||||
"pushed_at": "2023-02-02T06:08:05Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -557,13 +557,13 @@
|
|||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -28,6 +28,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 636517717,
|
||||
"name": "CVE-2023-0386",
|
||||
"full_name": "xkaneiki\/CVE-2023-0386",
|
||||
"owner": {
|
||||
"login": "xkaneiki",
|
||||
"id": 26479696,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26479696?v=4",
|
||||
"html_url": "https:\/\/github.com\/xkaneiki"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xkaneiki\/CVE-2023-0386",
|
||||
"description": "CVE-2023-0386在ubuntu22.04上的提权",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T03:02:13Z",
|
||||
"updated_at": "2023-05-11T20:49:01Z",
|
||||
"pushed_at": "2023-05-08T07:19:34Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 270,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 636975790,
|
||||
"name": "CVE-2023-0386",
|
||||
|
|
43
README.md
43
README.md
|
@ -72,6 +72,7 @@ A flaw was found in the Linux kernel, where unauthorized access to the execution
|
|||
</code>
|
||||
|
||||
- [Satheesh575555/linux-4.19.72_CVE-2023-0386](https://github.com/Satheesh575555/linux-4.19.72_CVE-2023-0386)
|
||||
- [xkaneiki/CVE-2023-0386](https://github.com/xkaneiki/CVE-2023-0386)
|
||||
- [chenaotian/CVE-2023-0386](https://github.com/chenaotian/CVE-2023-0386)
|
||||
- [CKevens/CVE-2023-0386](https://github.com/CKevens/CVE-2023-0386)
|
||||
- [hshivhare67/kernel_v4.19.72_CVE-2023-0386](https://github.com/hshivhare67/kernel_v4.19.72_CVE-2023-0386)
|
||||
|
@ -8450,6 +8451,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [PhuketIsland/CVE-2021-3156-centos7](https://github.com/PhuketIsland/CVE-2021-3156-centos7)
|
||||
- [0x4ndy/clif](https://github.com/0x4ndy/clif)
|
||||
- [meowhua15/CVE-2021-3156](https://github.com/meowhua15/CVE-2021-3156)
|
||||
- [mutur4/CVE-2021-3156](https://github.com/mutur4/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
|
||||
|
@ -15714,6 +15716,7 @@ GLPI before before version 9.4.6 has a vulnerability involving a default encrypt
|
|||
</code>
|
||||
|
||||
- [indevi0us/CVE-2020-5248](https://github.com/indevi0us/CVE-2020-5248)
|
||||
- [Mkway/CVE-2020-5248](https://github.com/Mkway/CVE-2020-5248)
|
||||
|
||||
### CVE-2020-5250 (2020-03-05)
|
||||
|
||||
|
@ -16676,6 +16679,7 @@ Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote C
|
|||
</code>
|
||||
|
||||
- [shanika04/apache_skywalking](https://github.com/shanika04/apache_skywalking)
|
||||
- [Neko-chanQwQ/CVE-2020-9483](https://github.com/Neko-chanQwQ/CVE-2020-9483)
|
||||
|
||||
### CVE-2020-9484 (2020-05-20)
|
||||
|
||||
|
@ -16719,6 +16723,7 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
|
|||
- [cyber-niz/CVE-2020-9496](https://github.com/cyber-niz/CVE-2020-9496)
|
||||
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
|
||||
- [ambalabanov/CVE-2020-9496](https://github.com/ambalabanov/CVE-2020-9496)
|
||||
- [s4dbrd/CVE-2020-9496](https://github.com/s4dbrd/CVE-2020-9496)
|
||||
- [Ly0nt4r/CVE-2020-9496](https://github.com/Ly0nt4r/CVE-2020-9496)
|
||||
|
||||
### CVE-2020-9547 (2020-03-01)
|
||||
|
@ -19260,6 +19265,7 @@ Git LFS 2.12.0 allows Remote Code Execution.
|
|||
- [nob0dy-3389/CVE-2020-27955](https://github.com/nob0dy-3389/CVE-2020-27955)
|
||||
- [Marsable/CVE-2020-27955-LFS](https://github.com/Marsable/CVE-2020-27955-LFS)
|
||||
- [FrostsaberX/CVE-2020-27955](https://github.com/FrostsaberX/CVE-2020-27955)
|
||||
- [whitetea2424/CVE-2020-27955-LFS-main](https://github.com/whitetea2424/CVE-2020-27955-LFS-main)
|
||||
- [userxfan/cve-2020-27955](https://github.com/userxfan/cve-2020-27955)
|
||||
- [z50913/CVE-2020-27955](https://github.com/z50913/CVE-2020-27955)
|
||||
- [Kimorea/CVE-2020-27955-LFS](https://github.com/Kimorea/CVE-2020-27955-LFS)
|
||||
|
@ -19383,6 +19389,7 @@ This affects the package xmlhttprequest before 1.7.0; all versions of package xm
|
|||
</code>
|
||||
|
||||
- [s-index/CVE-2020-28502](https://github.com/s-index/CVE-2020-28502)
|
||||
- [dpredrag/CVE-2020-28502](https://github.com/dpredrag/CVE-2020-28502)
|
||||
|
||||
### CVE-2020-28647 (2020-11-17)
|
||||
|
||||
|
@ -19600,6 +19607,14 @@ A vulnerability was found in openvswitch. A limitation in the implementation of
|
|||
|
||||
- [freddierice/cve-2020-35498-flag](https://github.com/freddierice/cve-2020-35498-flag)
|
||||
|
||||
### CVE-2020-35545 (2020-12-17)
|
||||
|
||||
<code>
|
||||
Time-based SQL injection exists in Spotweb 1.4.9 via the query string.
|
||||
</code>
|
||||
|
||||
- [bousalman/CVE-2020-35545](https://github.com/bousalman/CVE-2020-35545)
|
||||
|
||||
### CVE-2020-35590 (2020-12-21)
|
||||
|
||||
<code>
|
||||
|
@ -19673,6 +19688,15 @@ Directory traversal vulnerability in class-simple_job_board_resume_download_hand
|
|||
|
||||
- [M4xSec/Wordpress-CVE-2020-35749](https://github.com/M4xSec/Wordpress-CVE-2020-35749)
|
||||
|
||||
### CVE-2020-35846 (2020-12-29)
|
||||
|
||||
<code>
|
||||
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function.
|
||||
</code>
|
||||
|
||||
- [JohnHammond/CVE-2020-35846](https://github.com/JohnHammond/CVE-2020-35846)
|
||||
- [0z09e/CVE-2020-35846](https://github.com/0z09e/CVE-2020-35846)
|
||||
|
||||
### CVE-2020-35847 (2020-12-29)
|
||||
|
||||
<code>
|
||||
|
@ -19722,6 +19746,14 @@ FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction betwee
|
|||
|
||||
- [Al1ex/CVE-2020-36188](https://github.com/Al1ex/CVE-2020-36188)
|
||||
|
||||
### CVE-2020-36287 (2021-04-08)
|
||||
|
||||
<code>
|
||||
The dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server and Jira Data Center before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to obtain gadget related settings via a missing permissions check.
|
||||
</code>
|
||||
|
||||
- [f4rber/CVE-2020-36287](https://github.com/f4rber/CVE-2020-36287)
|
||||
|
||||
### CVE-2020-36518 (2022-03-11)
|
||||
|
||||
<code>
|
||||
|
@ -24007,6 +24039,7 @@ Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic
|
|||
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802)
|
||||
- [likescam/CVE-2018-0802_CVE-2017-11882](https://github.com/likescam/CVE-2018-0802_CVE-2017-11882)
|
||||
- [5l1v3r1/rtfkit](https://github.com/5l1v3r1/rtfkit)
|
||||
- [roninAPT/CVE-2018-0802](https://github.com/roninAPT/CVE-2018-0802)
|
||||
|
||||
### CVE-2018-0824 (2018-05-09)
|
||||
|
||||
|
@ -24939,6 +24972,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [purgedemo/CVE-2018-6574_2](https://github.com/purgedemo/CVE-2018-6574_2)
|
||||
- [killtr0/POC-CVE-2018-6574](https://github.com/killtr0/POC-CVE-2018-6574)
|
||||
- [theJuan1112/pentesterlab-cve-2018-6574](https://github.com/theJuan1112/pentesterlab-cve-2018-6574)
|
||||
- [MohamedTarekq/test-CVE-2018-6574-](https://github.com/MohamedTarekq/test-CVE-2018-6574-)
|
||||
- [OLAOLAOLA789/CVE-2018-6574](https://github.com/OLAOLAOLA789/CVE-2018-6574)
|
||||
- [repos13579/labCVE-2018-6574](https://github.com/repos13579/labCVE-2018-6574)
|
||||
- [yashanand/cve-2018-6574](https://github.com/yashanand/cve-2018-6574)
|
||||
|
@ -25351,6 +25385,7 @@ A remote code execution vulnerability exists in the way that the VBScript engine
|
|||
- [www201001/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP)
|
||||
- [www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git-](https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git-)
|
||||
- [delina1/CVE-2018-8174](https://github.com/delina1/CVE-2018-8174)
|
||||
- [delina1/CVE-2018-8174_EXP](https://github.com/delina1/CVE-2018-8174_EXP)
|
||||
- [DarkFlameMaster-bit/CVE-2018-8174_EXP](https://github.com/DarkFlameMaster-bit/CVE-2018-8174_EXP)
|
||||
- [lisinan988/CVE-2018-8174-exp](https://github.com/lisinan988/CVE-2018-8174-exp)
|
||||
- [sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP)
|
||||
|
@ -26211,6 +26246,14 @@ PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption
|
|||
|
||||
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
|
||||
|
||||
### CVE-2018-13797 (2018-07-10)
|
||||
|
||||
<code>
|
||||
The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.
|
||||
</code>
|
||||
|
||||
- [dsp-testing/CVE-2018-13797](https://github.com/dsp-testing/CVE-2018-13797)
|
||||
|
||||
### CVE-2018-13864 (2018-07-17)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue