Auto Update 2023/07/30 06:26:19

This commit is contained in:
motikan2010-bot 2023-07-30 15:26:19 +09:00
parent 40e5753254
commit d8c0754bda
40 changed files with 146 additions and 417 deletions

View file

@ -18,13 +18,13 @@
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 57,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 57,
"forks": 58,
"watchers": 112,
"score": 0,
"subscribers_count": 12

View file

@ -48,13 +48,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -13,7 +13,7 @@
"description": "JWT Key Confusion PoC (CVE-2015-9235) Written for the Hack the Box challenge - Under Construction",
"fork": false,
"created_at": "2022-01-13T23:09:13Z",
"updated_at": "2023-04-16T19:34:25Z",
"updated_at": "2023-07-30T01:17:32Z",
"pushed_at": "2022-02-13T22:42:53Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -2679,13 +2679,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 12,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
"fork": false,
"created_at": "2019-12-08T10:44:51Z",
"updated_at": "2022-07-06T21:45:25Z",
"updated_at": "2023-07-30T04:19:30Z",
"pushed_at": "2019-12-08T17:55:01Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
"updated_at": "2023-01-04T03:10:18Z",
"updated_at": "2023-07-30T05:12:19Z",
"pushed_at": "2022-08-17T19:20:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-28T14:15:56Z",
"updated_at": "2023-07-30T05:14:05Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 988,
"watchers_count": 988,
"stargazers_count": 989,
"watchers_count": 989,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 129,
"watchers": 988,
"watchers": 989,
"score": 0,
"subscribers_count": 9
}

View file

@ -1,32 +0,0 @@
[
{
"id": 443710863,
"name": "CVE-2021-24307-all-in-one-seo-pack-admin-rce",
"full_name": "darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
"owner": {
"login": "darkpills",
"id": 209987,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209987?v=4",
"html_url": "https:\/\/github.com\/darkpills"
},
"html_url": "https:\/\/github.com\/darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
"description": null,
"fork": false,
"created_at": "2022-01-02T07:50:09Z",
"updated_at": "2022-09-16T22:23:18Z",
"pushed_at": "2022-01-02T08:27:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 444335154,
"name": "CVE-2021-28750-site",
"full_name": "PfalzPrince\/CVE-2021-28750-site",
"owner": {
"login": "PfalzPrince",
"id": 96906354,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96906354?v=4",
"html_url": "https:\/\/github.com\/PfalzPrince"
},
"html_url": "https:\/\/github.com\/PfalzPrince\/CVE-2021-28750-site",
"description": "PoC Site for tsunami-security-scanner-plugins. ",
"fork": false,
"created_at": "2022-01-04T08:05:03Z",
"updated_at": "2022-01-04T09:01:44Z",
"pushed_at": "2022-01-04T09:02:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 443862591,
"name": "CVE-2021-30853",
"full_name": "shubham0d\/CVE-2021-30853",
"owner": {
"login": "shubham0d",
"id": 12750163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
"html_url": "https:\/\/github.com\/shubham0d"
},
"html_url": "https:\/\/github.com\/shubham0d\/CVE-2021-30853",
"description": "A sample POC to test CVE-2021-30853",
"fork": false,
"created_at": "2022-01-02T20:24:11Z",
"updated_at": "2023-07-28T03:36:19Z",
"pushed_at": "2022-01-02T20:50:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-07-28T18:10:05Z",
"updated_at": "2023-07-30T05:47:17Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1483,
"watchers_count": 1483,
"stargazers_count": 1484,
"watchers_count": 1484,
"has_discussions": false,
"forks_count": 489,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 489,
"watchers": 1483,
"watchers": 1484,
"score": 0,
"subscribers_count": 27
},
@ -523,10 +523,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2023-07-25T11:20:18Z",
"updated_at": "2023-07-30T05:47:19Z",
"pushed_at": "2022-06-22T20:21:42Z",
"stargazers_count": 751,
"watchers_count": 751,
"stargazers_count": 752,
"watchers_count": 752,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@ -542,7 +542,7 @@
],
"visibility": "public",
"forks": 169,
"watchers": 751,
"watchers": 752,
"score": 0,
"subscribers_count": 18
},

View file

@ -1,34 +1,4 @@
[
{
"id": 444133204,
"name": "CVE-2021-43857",
"full_name": "LongWayHomie\/CVE-2021-43857",
"owner": {
"login": "LongWayHomie",
"id": 63229183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
"html_url": "https:\/\/github.com\/LongWayHomie"
},
"html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43857",
"description": "Gerapy prior to version 0.9.8 is vulnerable to remote code execution. This issue is patched in version 0.9.8.",
"fork": false,
"created_at": "2022-01-03T16:47:42Z",
"updated_at": "2023-03-29T02:26:23Z",
"pushed_at": "2022-01-03T16:53:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 485594121,
"name": "CVE-2021-43857",

View file

@ -1,34 +1,4 @@
[
{
"id": 444140549,
"name": "cve-2021-43858",
"full_name": "0rx1\/cve-2021-43858",
"owner": {
"login": "0rx1",
"id": 12779060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
"html_url": "https:\/\/github.com\/0rx1"
},
"html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858",
"description": null,
"fork": false,
"created_at": "2022-01-03T17:11:54Z",
"updated_at": "2022-06-10T03:20:10Z",
"pushed_at": "2022-01-03T14:15:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 626802613,
"name": "CVE-2021-43858-MinIO",

View file

@ -13,10 +13,10 @@
"description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.",
"fork": false,
"created_at": "2023-02-08T07:30:52Z",
"updated_at": "2023-07-29T23:54:40Z",
"updated_at": "2023-07-30T04:01:35Z",
"pushed_at": "2023-06-22T19:19:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -3359,10 +3359,10 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
"updated_at": "2023-05-28T01:56:12Z",
"updated_at": "2023-07-30T01:24:51Z",
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -3371,7 +3371,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 345,
"watchers": 346,
"score": 0,
"subscribers_count": 6
},
@ -10446,69 +10446,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 443563564,
"name": "-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"full_name": "marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"owner": {
"login": "marklindsey11",
"id": 81498475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
"html_url": "https:\/\/github.com\/marklindsey11"
},
"html_url": "https:\/\/github.com\/marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"description": "Log4j Vulnerability Scanner",
"fork": false,
"created_at": "2022-01-01T15:13:22Z",
"updated_at": "2023-03-07T19:39:44Z",
"pushed_at": "2022-01-01T15:31:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": false,
"topics": [
"hunting",
"threat"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 443614046,
"name": "gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
"full_name": "marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
"owner": {
"login": "marklindsey11",
"id": 81498475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
"html_url": "https:\/\/github.com\/marklindsey11"
},
"html_url": "https:\/\/github.com\/marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
"description": "Log4j-Scanner",
"fork": false,
"created_at": "2022-01-01T20:01:01Z",
"updated_at": "2022-01-01T20:01:06Z",
"pushed_at": "2022-01-01T20:01:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 443941194,
"name": "log4j2-test",
@ -10902,36 +10839,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 447682859,
"name": "log4j-exploit-builder",
"full_name": "atlassion\/log4j-exploit-builder",
"owner": {
"login": "atlassion",
"id": 49542929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49542929?v=4",
"html_url": "https:\/\/github.com\/atlassion"
},
"html_url": "https:\/\/github.com\/atlassion\/log4j-exploit-builder",
"description": "Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell",
"fork": false,
"created_at": "2022-01-13T17:03:54Z",
"updated_at": "2022-06-30T18:53:34Z",
"pushed_at": "2021-12-29T18:34:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 447683203,
"name": "RS4LOGJ-CVE-2021-44228",

View file

@ -212,36 +212,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 443609406,
"name": "-cve-2021-45232",
"full_name": "itxfahdi\/-cve-2021-45232",
"owner": {
"login": "itxfahdi",
"id": 67527602,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67527602?v=4",
"html_url": "https:\/\/github.com\/itxfahdi"
},
"html_url": "https:\/\/github.com\/itxfahdi\/-cve-2021-45232",
"description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1",
"fork": false,
"created_at": "2022-01-01T19:31:13Z",
"updated_at": "2022-01-01T20:22:16Z",
"pushed_at": "2022-01-01T20:22:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 444659919,
"name": "CVE-2021-45232-RCE",

View file

@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
"updated_at": "2023-01-04T03:10:18Z",
"updated_at": "2023-07-30T05:12:19Z",
"pushed_at": "2022-08-17T19:20:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -348,7 +348,7 @@
"fork": false,
"created_at": "2022-10-29T18:25:26Z",
"updated_at": "2023-05-06T12:14:50Z",
"pushed_at": "2023-07-25T20:46:14Z",
"pushed_at": "2023-07-30T06:14:28Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-28T14:15:56Z",
"updated_at": "2023-07-30T05:14:05Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 988,
"watchers_count": 988,
"stargazers_count": 989,
"watchers_count": 989,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 129,
"watchers": 988,
"watchers": 989,
"score": 0,
"subscribers_count": 9
},

View file

@ -211,7 +211,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 635230649,

View file

@ -18,13 +18,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
"fork": false,
"created_at": "2022-10-01T11:53:14Z",
"updated_at": "2023-04-23T20:16:20Z",
"updated_at": "2023-07-30T01:29:26Z",
"pushed_at": "2023-01-03T08:37:33Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 1
},

View file

@ -197,10 +197,10 @@
"description": "An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products",
"fork": false,
"created_at": "2023-06-21T21:22:35Z",
"updated_at": "2023-07-29T22:44:28Z",
"updated_at": "2023-07-30T04:04:25Z",
"pushed_at": "2023-06-21T21:24:52Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -209,7 +209,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -78,13 +78,13 @@
"stargazers_count": 814,
"watchers_count": 814,
"has_discussions": false,
"forks_count": 55,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 55,
"forks": 56,
"watchers": 814,
"score": 0,
"subscribers_count": 25
@ -344,7 +344,7 @@
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 608056893,

View file

@ -13,10 +13,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-01-30T12:57:48Z",
"updated_at": "2023-07-27T06:55:12Z",
"updated_at": "2023-07-30T02:39:26Z",
"pushed_at": "2023-02-27T04:51:20Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -35,9 +35,9 @@
],
"visibility": "public",
"forks": 54,
"watchers": 237,
"watchers": 238,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 600993696,

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-07-28T02:45:44Z",
"updated_at": "2023-07-30T04:43:12Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"has_discussions": false,
"forks_count": 157,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 157,
"watchers": 420,
"watchers": 421,
"score": 0,
"subscribers_count": 10
},

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -480,13 +480,13 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 23,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.",
"fork": false,
"created_at": "2023-06-19T14:36:47Z",
"updated_at": "2023-07-26T13:34:25Z",
"updated_at": "2023-07-30T04:33:25Z",
"pushed_at": "2023-06-22T07:19:36Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 1
},

View file

@ -318,7 +318,7 @@
"fork": false,
"created_at": "2023-07-29T20:43:16Z",
"updated_at": "2023-07-29T21:17:58Z",
"pushed_at": "2023-07-29T20:48:00Z",
"pushed_at": "2023-07-30T03:47:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -331,6 +331,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-07-29T21:51:39Z",
"updated_at": "2023-07-30T06:22:26Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 329,
"watchers_count": 329,
"stargazers_count": 332,
"watchers_count": 332,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 329,
"watchers": 332,
"score": 0,
"subscribers_count": 19
"subscribers_count": 16
}
]

View file

@ -103,10 +103,10 @@
"description": "Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit",
"fork": false,
"created_at": "2023-06-01T06:27:09Z",
"updated_at": "2023-07-27T09:03:51Z",
"updated_at": "2023-07-30T01:10:52Z",
"pushed_at": "2023-06-01T05:54:25Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 0
},

View file

@ -57,6 +57,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -172,13 +172,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
"fork": false,
"created_at": "2023-07-29T05:06:27Z",
"updated_at": "2023-07-29T23:18:32Z",
"updated_at": "2023-07-30T02:50:10Z",
"pushed_at": "2023-07-29T16:58:16Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,9 +25,9 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
},
{
"id": 672358707,
@ -57,6 +57,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "POC of CVE-2023-35086 only DoS",
"fork": false,
"created_at": "2023-07-25T01:36:07Z",
"updated_at": "2023-07-29T01:07:28Z",
"updated_at": "2023-07-30T04:21:45Z",
"pushed_at": "2023-07-25T01:42:02Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Citrix Scanner for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T13:16:38Z",
"updated_at": "2023-07-25T20:06:06Z",
"updated_at": "2023-07-30T03:42:46Z",
"pushed_at": "2023-07-24T11:49:37Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 4
},
@ -47,10 +47,10 @@
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
"updated_at": "2023-07-29T01:54:37Z",
"updated_at": "2023-07-30T03:31:57Z",
"pushed_at": "2023-07-23T03:54:44Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "Proof of Concept for CVE-2023-38646",
"fork": false,
"created_at": "2023-07-28T12:29:16Z",
"updated_at": "2023-07-28T12:30:14Z",
"updated_at": "2023-07-30T01:31:51Z",
"pushed_at": "2023-07-28T12:31:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -133,10 +133,10 @@
"description": "Metabase Pre-auth RCE (CVE-2023-38646)!!",
"fork": false,
"created_at": "2023-07-29T13:07:00Z",
"updated_at": "2023-07-29T16:46:28Z",
"updated_at": "2023-07-30T01:33:04Z",
"pushed_at": "2023-07-29T14:02:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -150,7 +150,37 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 672405863,
"name": "CVE-2023-38646",
"full_name": "Chocapikk\/CVE-2023-38646",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-38646",
"description": "Remote Code Execution on Metabase CVE-2023-38646",
"fork": false,
"created_at": "2023-07-30T01:12:24Z",
"updated_at": "2023-07-30T01:12:56Z",
"pushed_at": "2023-07-30T01:12:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -2522,6 +2522,7 @@
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
- [hheeyywweellccoommee/CVE-2023-38646-suynl](https://github.com/hheeyywweellccoommee/CVE-2023-38646-suynl)
- [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646)
- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646)
### CVE-2023-39144
- [cduram/CVE-2023-39144](https://github.com/cduram/CVE-2023-39144)
@ -10518,13 +10519,6 @@
- [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160)
- [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160)
### CVE-2021-24307 (2021-05-24)
<code>The All in One SEO Best WordPress SEO Plugin Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with &quot;aioseo_tools_settings&quot; privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section &quot;Tool &gt; Import/Export&quot;. However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.
</code>
- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
### CVE-2021-24347 (2021-06-14)
<code>The SP Project &amp; Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from &quot;php&quot; to &quot;pHP&quot;.
@ -11238,9 +11232,6 @@
- [lntrx/CVE-2021-28663](https://github.com/lntrx/CVE-2021-28663)
### CVE-2021-28750
- [PfalzPrince/CVE-2021-28750-site](https://github.com/PfalzPrince/CVE-2021-28750-site)
### CVE-2021-29003 (2021-04-13)
<code>Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.
@ -11477,13 +11468,6 @@
- [jsherman212/iomfb-exploit](https://github.com/jsherman212/iomfb-exploit)
- [30440r/gex](https://github.com/30440r/gex)
### CVE-2021-30853 (2021-08-24)
<code>This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6. A malicious application may bypass Gatekeeper checks.
</code>
- [shubham0d/CVE-2021-30853](https://github.com/shubham0d/CVE-2021-30853)
### CVE-2021-30858 (2021-08-24)
<code>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
@ -13904,7 +13888,6 @@
<code>Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
</code>
- [LongWayHomie/CVE-2021-43857](https://github.com/LongWayHomie/CVE-2021-43857)
- [lowkey0808/CVE-2021-43857](https://github.com/lowkey0808/CVE-2021-43857)
### CVE-2021-43858 (2021-12-27)
@ -13912,7 +13895,6 @@
<code>MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
</code>
- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858)
- [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO)
### CVE-2021-43883 (2021-12-15)
@ -14340,8 +14322,6 @@
- [PoneyClairDeLune/LogJackFix](https://github.com/PoneyClairDeLune/LogJackFix)
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
- [marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV](https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV)
- [mklinkj/log4j2-test](https://github.com/mklinkj/log4j2-test)
- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
@ -14355,7 +14335,6 @@
- [maximofernandezriera/CVE-2021-44228](https://github.com/maximofernandezriera/CVE-2021-44228)
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
- [atlassion/log4j-exploit-builder](https://github.com/atlassion/log4j-exploit-builder)
- [atlassion/RS4LOGJ-CVE-2021-44228](https://github.com/atlassion/RS4LOGJ-CVE-2021-44228)
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
@ -14592,7 +14571,6 @@
- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
- [itxfahdi/-cve-2021-45232](https://github.com/itxfahdi/-cve-2021-45232)
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
- [Kuibagit/CVE-2021-45232-RCE](https://github.com/Kuibagit/CVE-2021-45232-RCE)
- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)