mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/07/15 00:30:04
This commit is contained in:
parent
07acb5d1a4
commit
d7b29a1858
25 changed files with 473 additions and 53 deletions
|
@ -284,7 +284,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-06T22:46:08Z",
|
||||
"updated_at": "2023-05-07T22:01:09Z",
|
||||
"pushed_at": "2023-07-14T13:04:26Z",
|
||||
"pushed_at": "2023-07-14T19:20:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "A code demonstrating CVE-2018-0886",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-02T12:52:07Z",
|
||||
"updated_at": "2023-06-13T14:41:04Z",
|
||||
"updated_at": "2023-07-14T18:46:44Z",
|
||||
"pushed_at": "2020-08-14T16:33:44Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 262,
|
||||
"forks": 67,
|
||||
"watchers": 263,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2021-1675 Detection Info",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T18:32:17Z",
|
||||
"updated_at": "2023-07-07T19:10:39Z",
|
||||
"updated_at": "2023-07-14T20:21:11Z",
|
||||
"pushed_at": "2023-05-20T01:53:16Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 217,
|
||||
"watchers": 218,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-26T09:00:10Z",
|
||||
"updated_at": "2022-11-28T09:23:41Z",
|
||||
"updated_at": "2023-07-14T23:04:11Z",
|
||||
"pushed_at": "2022-11-26T11:10:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -795,10 +795,10 @@
|
|||
"description": "CVE-2022-26134 Confluence OGNL Injection POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T10:36:11Z",
|
||||
"updated_at": "2023-03-06T10:20:57Z",
|
||||
"updated_at": "2023-07-14T21:00:43Z",
|
||||
"pushed_at": "2022-06-07T10:53:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -807,7 +807,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-09T14:15:30Z",
|
||||
"updated_at": "2023-07-13T15:20:06Z",
|
||||
"updated_at": "2023-07-14T23:25:32Z",
|
||||
"pushed_at": "2022-12-05T23:36:42Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 597559046,
|
||||
"name": "CVE-2023-0045",
|
||||
"full_name": "ASkyeye\/CVE-2023-0045",
|
||||
"owner": {
|
||||
"login": "ASkyeye",
|
||||
"id": 50972716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50972716?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASkyeye"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASkyeye\/CVE-2023-0045",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-04T22:42:21Z",
|
||||
"updated_at": "2023-02-23T07:53:12Z",
|
||||
"pushed_at": "2023-02-03T22:22:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 598766898,
|
||||
"name": "CVE-2023-0045",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 586854096,
|
||||
"name": "CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"full_name": "bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"owner": {
|
||||
"login": "bAuh0lz",
|
||||
"id": 15223611,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15223611?v=4",
|
||||
"html_url": "https:\/\/github.com\/bAuh0lz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"description": "CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-09T11:44:09Z",
|
||||
"updated_at": "2023-06-30T14:13:51Z",
|
||||
"pushed_at": "2023-01-14T04:40:47Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 601937653,
|
||||
"name": "CVE-2023-0297",
|
||||
|
|
32
2023/CVE-2023-0315.json
Normal file
32
2023/CVE-2023-0315.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 594862535,
|
||||
"name": "CVE-2023-0315",
|
||||
"full_name": "mhaskar\/CVE-2023-0315",
|
||||
"owner": {
|
||||
"login": "mhaskar",
|
||||
"id": 6861215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
|
||||
"html_url": "https:\/\/github.com\/mhaskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2023-0315",
|
||||
"description": "The official exploit for Froxlor Remote Code Execution CVE-2023-0315",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-29T21:20:26Z",
|
||||
"updated_at": "2023-02-13T01:56:55Z",
|
||||
"pushed_at": "2023-01-29T21:23:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-21739.json
Normal file
32
2023/CVE-2023-21739.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 591426445,
|
||||
"name": "CVE-2023-21739",
|
||||
"full_name": "gmh5225\/CVE-2023-21739",
|
||||
"owner": {
|
||||
"login": "gmh5225",
|
||||
"id": 13917777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmh5225"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2023-21739",
|
||||
"description": "Windows Bluetooth Driver Elevation of Privilege Vulnerability. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-20T18:21:40Z",
|
||||
"updated_at": "2023-02-20T15:28:18Z",
|
||||
"pushed_at": "2023-01-18T23:57:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-21752.json
Normal file
32
2023/CVE-2023-21752.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 587377595,
|
||||
"name": "CVE-2023-21752",
|
||||
"full_name": "Wh04m1001\/CVE-2023-21752",
|
||||
"owner": {
|
||||
"login": "Wh04m1001",
|
||||
"id": 44291883,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
|
||||
"html_url": "https:\/\/github.com\/Wh04m1001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Wh04m1001\/CVE-2023-21752",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2023-07-10T04:33:33Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 287,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"forks": 156,
|
||||
"watchers": 417,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-10T19:08:28Z",
|
||||
"updated_at": "2023-07-09T14:55:08Z",
|
||||
"updated_at": "2023-07-14T23:22:07Z",
|
||||
"pushed_at": "2023-03-10T20:16:53Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -93,7 +93,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -35,5 +35,35 @@
|
|||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 592920759,
|
||||
"name": "CVE-2023-22960",
|
||||
"full_name": "manas3c\/CVE-2023-22960",
|
||||
"owner": {
|
||||
"login": "manas3c",
|
||||
"id": 123151924,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123151924?v=4",
|
||||
"html_url": "https:\/\/github.com\/manas3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/manas3c\/CVE-2023-22960",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T20:23:09Z",
|
||||
"updated_at": "2023-01-24T22:12:37Z",
|
||||
"pushed_at": "2023-01-24T20:23:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"forks": 43,
|
||||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -178,13 +178,13 @@
|
|||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"forks": 61,
|
||||
"watchers": 331,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
@ -700,5 +700,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 666573953,
|
||||
"name": "OutlookNTLM_CVE-2023-23397",
|
||||
"full_name": "Muhammad-Ali007\/OutlookNTLM_CVE-2023-23397",
|
||||
"owner": {
|
||||
"login": "Muhammad-Ali007",
|
||||
"id": 64638296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64638296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Muhammad-Ali007"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Muhammad-Ali007\/OutlookNTLM_CVE-2023-23397",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-14T22:02:55Z",
|
||||
"updated_at": "2023-07-14T22:22:56Z",
|
||||
"pushed_at": "2023-07-14T22:21:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-23924.json
Normal file
32
2023/CVE-2023-23924.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 596224234,
|
||||
"name": "CVE-2023-23924",
|
||||
"full_name": "motikan2010\/CVE-2023-23924",
|
||||
"owner": {
|
||||
"login": "motikan2010",
|
||||
"id": 3177297,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
|
||||
"html_url": "https:\/\/github.com\/motikan2010"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2023-23924",
|
||||
"description": "CVE-2023-23924 (Dompdf - RCE) PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-01T18:21:23Z",
|
||||
"updated_at": "2023-05-13T02:06:18Z",
|
||||
"pushed_at": "2023-02-02T02:05:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 592899217,
|
||||
"name": "CVE-2023-24055",
|
||||
"full_name": "deetl\/CVE-2023-24055",
|
||||
"owner": {
|
||||
"login": "deetl",
|
||||
"id": 50047716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50047716?v=4",
|
||||
"html_url": "https:\/\/github.com\/deetl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/deetl\/CVE-2023-24055",
|
||||
"description": "POC and Scanner for CVE-2023-24055",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T19:19:23Z",
|
||||
"updated_at": "2023-06-02T15:25:05Z",
|
||||
"pushed_at": "2023-01-25T00:04:57Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 593024753,
|
||||
"name": "CVE-2023-24055_PoC",
|
||||
|
@ -99,6 +129,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 595342543,
|
||||
"name": "PoC_CVE-2023-24055",
|
||||
"full_name": "julesbozouklian\/PoC_CVE-2023-24055",
|
||||
"owner": {
|
||||
"login": "julesbozouklian",
|
||||
"id": 26013529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26013529?v=4",
|
||||
"html_url": "https:\/\/github.com\/julesbozouklian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/julesbozouklian\/PoC_CVE-2023-24055",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T22:10:57Z",
|
||||
"updated_at": "2023-02-15T09:27:08Z",
|
||||
"pushed_at": "2023-01-31T14:36:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 599394994,
|
||||
"name": "KeePass-TriggerLess",
|
||||
|
|
32
2023/CVE-2023-24059.json
Normal file
32
2023/CVE-2023-24059.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 592223844,
|
||||
"name": "CVE-2023-24059",
|
||||
"full_name": "gmh5225\/CVE-2023-24059",
|
||||
"owner": {
|
||||
"login": "gmh5225",
|
||||
"id": 13917777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmh5225"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2023-24059",
|
||||
"description": "Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-23T08:48:08Z",
|
||||
"updated_at": "2023-02-20T16:16:21Z",
|
||||
"pushed_at": "2023-01-22T11:39:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-24610.json
Normal file
32
2023/CVE-2023-24610.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 595331354,
|
||||
"name": "CVE-2023-24610",
|
||||
"full_name": "abbisQQ\/CVE-2023-24610",
|
||||
"owner": {
|
||||
"login": "abbisQQ",
|
||||
"id": 21143253,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21143253?v=4",
|
||||
"html_url": "https:\/\/github.com\/abbisQQ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/abbisQQ\/CVE-2023-24610",
|
||||
"description": "This is a proof of concept for CVE-2023-24610",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T21:33:46Z",
|
||||
"updated_at": "2023-07-14T01:02:42Z",
|
||||
"pushed_at": "2023-02-01T16:02:35Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -44,11 +44,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-12T02:41:26Z",
|
||||
"updated_at": "2023-07-12T15:21:26Z",
|
||||
"pushed_at": "2023-07-14T06:04:29Z",
|
||||
"pushed_at": "2023-07-14T21:47:59Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"wordpresss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "WordPress社交登录和注册(Discord,Google,Twitter,LinkedIn)<=7.6.4-绕过身份验证",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-30T09:15:02Z",
|
||||
"updated_at": "2023-07-13T02:23:11Z",
|
||||
"updated_at": "2023-07-14T22:49:31Z",
|
||||
"pushed_at": "2023-07-07T14:22:49Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-07-14T11:29:45Z",
|
||||
"updated_at": "2023-07-14T21:10:04Z",
|
||||
"pushed_at": "2023-07-08T09:27:10Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 283,
|
||||
"watchers": 282,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2023-07-14T13:09:21Z",
|
||||
"updated_at": "2023-07-14T21:10:00Z",
|
||||
"pushed_at": "2023-06-03T23:23:11Z",
|
||||
"stargazers_count": 503,
|
||||
"watchers_count": 503,
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 503,
|
||||
"watchers": 502,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux kernel LPE practice with an NPD vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-29T10:12:18Z",
|
||||
"updated_at": "2023-07-13T14:32:41Z",
|
||||
"updated_at": "2023-07-14T23:53:55Z",
|
||||
"pushed_at": "2023-07-11T23:13:38Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
48
README.md
48
README.md
|
@ -6,6 +6,7 @@
|
|||
<code>The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n
|
||||
</code>
|
||||
|
||||
- [ASkyeye/CVE-2023-0045](https://github.com/ASkyeye/CVE-2023-0045)
|
||||
- [es0j/CVE-2023-0045](https://github.com/es0j/CVE-2023-0045)
|
||||
|
||||
### CVE-2023-0050 (2023-03-09)
|
||||
|
@ -31,10 +32,18 @@
|
|||
<code>Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
|
||||
</code>
|
||||
|
||||
- [bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad](https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad)
|
||||
- [Small-ears/CVE-2023-0297](https://github.com/Small-ears/CVE-2023-0297)
|
||||
- [JacobEbben/CVE-2023-0297](https://github.com/JacobEbben/CVE-2023-0297)
|
||||
- [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297)
|
||||
|
||||
### CVE-2023-0315 (2023-01-15)
|
||||
|
||||
<code>Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8.
|
||||
</code>
|
||||
|
||||
- [mhaskar/CVE-2023-0315](https://github.com/mhaskar/CVE-2023-0315)
|
||||
|
||||
### CVE-2023-0386 (2023-03-22)
|
||||
|
||||
<code>A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
|
||||
|
@ -497,6 +506,13 @@
|
|||
- [JMousqueton/CVE-2023-21716](https://github.com/JMousqueton/CVE-2023-21716)
|
||||
- [Lord-of-the-IoT/CVE-2023-21716](https://github.com/Lord-of-the-IoT/CVE-2023-21716)
|
||||
|
||||
### CVE-2023-21739 (2023-01-10)
|
||||
|
||||
<code>Windows Bluetooth Driver Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2023-21739](https://github.com/gmh5225/CVE-2023-21739)
|
||||
|
||||
### CVE-2023-21742 (2023-01-10)
|
||||
|
||||
<code>Microsoft SharePoint Server Remote Code Execution Vulnerability
|
||||
|
@ -504,6 +520,13 @@
|
|||
|
||||
- [ohnonoyesyes/CVE-2023-21742](https://github.com/ohnonoyesyes/CVE-2023-21742)
|
||||
|
||||
### CVE-2023-21752 (2023-01-10)
|
||||
|
||||
<code>Windows Backup Service Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Wh04m1001/CVE-2023-21752](https://github.com/Wh04m1001/CVE-2023-21752)
|
||||
|
||||
### CVE-2023-21766 (2023-01-10)
|
||||
|
||||
<code>Windows Overlay Filter Information Disclosure Vulnerability
|
||||
|
@ -624,6 +647,7 @@
|
|||
</code>
|
||||
|
||||
- [t3l3machus/CVE-2023-22960](https://github.com/t3l3machus/CVE-2023-22960)
|
||||
- [manas3c/CVE-2023-22960](https://github.com/manas3c/CVE-2023-22960)
|
||||
|
||||
### CVE-2023-22974 (2023-02-22)
|
||||
|
||||
|
@ -701,6 +725,7 @@
|
|||
- [jacquesquail/CVE-2023-23397](https://github.com/jacquesquail/CVE-2023-23397)
|
||||
- [CKevens/CVE-2023-23397-POC](https://github.com/CKevens/CVE-2023-23397-POC)
|
||||
- [vlad-a-man/CVE-2023-23397](https://github.com/vlad-a-man/CVE-2023-23397)
|
||||
- [Muhammad-Ali007/OutlookNTLM_CVE-2023-23397](https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397)
|
||||
|
||||
### CVE-2023-23488 (2023-01-20)
|
||||
|
||||
|
@ -756,17 +781,33 @@
|
|||
- [wibuheker/Joomla-CVE-2023-23752](https://github.com/wibuheker/Joomla-CVE-2023-23752)
|
||||
- [Sweelg/CVE-2023-23752](https://github.com/Sweelg/CVE-2023-23752)
|
||||
|
||||
### CVE-2023-23924 (2023-01-31)
|
||||
|
||||
<code>Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
|
||||
</code>
|
||||
|
||||
- [motikan2010/CVE-2023-23924](https://github.com/motikan2010/CVE-2023-23924)
|
||||
|
||||
### CVE-2023-24055 (2023-01-21)
|
||||
|
||||
<code>** DISPUTED ** KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
|
||||
</code>
|
||||
|
||||
- [deetl/CVE-2023-24055](https://github.com/deetl/CVE-2023-24055)
|
||||
- [alt3kx/CVE-2023-24055_PoC](https://github.com/alt3kx/CVE-2023-24055_PoC)
|
||||
- [Cyb3rtus/keepass_CVE-2023-24055_yara_rule](https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule)
|
||||
- [ATTACKnDEFEND/CVE-2023-24055](https://github.com/ATTACKnDEFEND/CVE-2023-24055)
|
||||
- [julesbozouklian/PoC_CVE-2023-24055](https://github.com/julesbozouklian/PoC_CVE-2023-24055)
|
||||
- [digital-dev/KeePass-TriggerLess](https://github.com/digital-dev/KeePass-TriggerLess)
|
||||
- [zwlsix/KeePass-CVE-2023-24055](https://github.com/zwlsix/KeePass-CVE-2023-24055)
|
||||
|
||||
### CVE-2023-24059 (2023-01-22)
|
||||
|
||||
<code>Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2023-24059](https://github.com/gmh5225/CVE-2023-24059)
|
||||
|
||||
### CVE-2023-24078 (2023-02-17)
|
||||
|
||||
<code>Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/.
|
||||
|
@ -803,6 +844,13 @@
|
|||
|
||||
- [adhikara13/CVE-2023-24489-ShareFile](https://github.com/adhikara13/CVE-2023-24489-ShareFile)
|
||||
|
||||
### CVE-2023-24610 (2023-02-01)
|
||||
|
||||
<code>NOSH 4a5cfdb allows remote authenticated users to execute PHP arbitrary code via the "practice logo" upload feature. The client-side checks can be bypassed. This may allow attackers to steal Protected Health Information because the product is for health charting.
|
||||
</code>
|
||||
|
||||
- [abbisQQ/CVE-2023-24610](https://github.com/abbisQQ/CVE-2023-24610)
|
||||
|
||||
### CVE-2023-24709 (2023-03-21)
|
||||
|
||||
<code>An issue found in Paradox Security Systems IPR512 allows attackers to cause a denial of service via the login.html and login.xml parameters.
|
||||
|
|
Loading…
Reference in a new issue