Auto Update 2023/10/26 18:25:13

This commit is contained in:
motikan2010-bot 2023-10-27 03:25:13 +09:00
parent 5ba8fc79d6
commit db6faceca3
48 changed files with 469 additions and 150 deletions

32
2009/CVE-2009-1904.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 222021,
"name": "bigdecimal-segfault-fix",
"full_name": "NZKoz\/bigdecimal-segfault-fix",
"owner": {
"login": "NZKoz",
"id": 197,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/197?v=4",
"html_url": "https:\/\/github.com\/NZKoz"
},
"html_url": "https:\/\/github.com\/NZKoz\/bigdecimal-segfault-fix",
"description": "Provides a quick workaround for the segfault bug in Ruby (CVE-2009-1904)",
"fork": false,
"created_at": "2009-06-08T23:21:40Z",
"updated_at": "2016-09-04T16:50:03Z",
"pushed_at": "2009-06-08T23:31:06Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -27,6 +27,6 @@
"forks": 3, "forks": 3,
"watchers": 20, "watchers": 20,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 3
} }
] ]

View file

@ -87,7 +87,7 @@
"forks": 404, "forks": 404,
"watchers": 933, "watchers": 933,
"score": 0, "score": 0,
"subscribers_count": 66 "subscribers_count": 65
}, },
{ {
"id": 71579896, "id": 71579896,
@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195", "description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false, "fork": false,
"created_at": "2016-11-25T21:08:01Z", "created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-10-24T11:09:40Z", "updated_at": "2023-10-26T14:21:47Z",
"pushed_at": "2021-04-08T11:35:12Z", "pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 770, "stargazers_count": 771,
"watchers_count": 770, "watchers_count": 771,
"has_discussions": false, "has_discussions": false,
"forks_count": 437, "forks_count": 437,
"allow_forking": true, "allow_forking": true,
@ -463,7 +463,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 437, "forks": 437,
"watchers": 770, "watchers": 771,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },
@ -1463,6 +1463,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -449,13 +449,13 @@
"stargazers_count": 404, "stargazers_count": 404,
"watchers_count": 404, "watchers_count": 404,
"has_discussions": false, "has_discussions": false,
"forks_count": 159, "forks_count": 161,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 159, "forks": 161,
"watchers": 404, "watchers": 404,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9

View file

@ -37,7 +37,7 @@
"forks": 92, "forks": 92,
"watchers": 555, "watchers": 555,
"score": 0, "score": 0,
"subscribers_count": 55 "subscribers_count": 54
}, },
{ {
"id": 116319052, "id": 116319052,

View file

@ -43,10 +43,10 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.", "description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false, "fork": false,
"created_at": "2018-06-21T15:44:29Z", "created_at": "2018-06-21T15:44:29Z",
"updated_at": "2023-10-09T13:41:10Z", "updated_at": "2023-10-26T12:52:23Z",
"pushed_at": "2020-01-30T12:52:42Z", "pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 199, "stargazers_count": 200,
"watchers_count": 199, "watchers_count": 200,
"has_discussions": false, "has_discussions": false,
"forks_count": 73, "forks_count": 73,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 73, "forks": 73,
"watchers": 199, "watchers": 200,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -288,19 +288,19 @@
"description": "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:", "description": "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:",
"fork": false, "fork": false,
"created_at": "2022-10-31T06:38:11Z", "created_at": "2022-10-31T06:38:11Z",
"updated_at": "2023-06-08T05:19:54Z", "updated_at": "2023-10-26T17:01:41Z",
"pushed_at": "2022-11-17T01:22:12Z", "pushed_at": "2022-11-17T01:22:12Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -37,6 +37,6 @@
"forks": 92, "forks": 92,
"watchers": 555, "watchers": 555,
"score": 0, "score": 0,
"subscribers_count": 55 "subscribers_count": 54
} }
] ]

View file

@ -27,6 +27,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -874,7 +874,7 @@
"fork": false, "fork": false,
"created_at": "2023-05-15T08:13:46Z", "created_at": "2023-05-15T08:13:46Z",
"updated_at": "2023-05-15T08:27:15Z", "updated_at": "2023-05-15T08:27:15Z",
"pushed_at": "2023-10-23T05:19:56Z", "pushed_at": "2023-10-26T14:04:31Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -28,5 +28,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 710374224,
"name": "CVE-2019-1663-vuln",
"full_name": "e180175\/CVE-2019-1663-vuln",
"owner": {
"login": "e180175",
"id": 57728787,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57728787?v=4",
"html_url": "https:\/\/github.com\/e180175"
},
"html_url": "https:\/\/github.com\/e180175\/CVE-2019-1663-vuln",
"description": null,
"fork": false,
"created_at": "2023-10-26T15:08:52Z",
"updated_at": "2023-10-26T15:52:02Z",
"pushed_at": "2023-10-26T16:22:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -18,13 +18,13 @@
"stargazers_count": 404, "stargazers_count": 404,
"watchers_count": 404, "watchers_count": 404,
"has_discussions": false, "has_discussions": false,
"forks_count": 159, "forks_count": 161,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 159, "forks": 161,
"watchers": 404, "watchers": 404,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9

View file

@ -13,10 +13,10 @@
"description": "Exploits for Android Binder bug CVE-2020-0041", "description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false, "fork": false,
"created_at": "2020-03-31T17:53:57Z", "created_at": "2020-03-31T17:53:57Z",
"updated_at": "2023-10-22T17:26:14Z", "updated_at": "2023-10-26T14:23:41Z",
"pushed_at": "2020-04-08T08:55:30Z", "pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 206, "stargazers_count": 207,
"watchers_count": 206, "watchers_count": 207,
"has_discussions": false, "has_discussions": false,
"forks_count": 70, "forks_count": 70,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 70, "forks": 70,
"watchers": 206, "watchers": 207,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -644,14 +644,14 @@
{ {
"id": 554151760, "id": 554151760,
"name": "CVE-2020-0688-Python3", "name": "CVE-2020-0688-Python3",
"full_name": "TheKickPuncher\/CVE-2020-0688-Python3", "full_name": "1337-llama\/CVE-2020-0688-Python3",
"owner": { "owner": {
"login": "TheKickPuncher", "login": "1337-llama",
"id": 71475034, "id": 71475034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71475034?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71475034?v=4",
"html_url": "https:\/\/github.com\/TheKickPuncher" "html_url": "https:\/\/github.com\/1337-llama"
}, },
"html_url": "https:\/\/github.com\/TheKickPuncher\/CVE-2020-0688-Python3", "html_url": "https:\/\/github.com\/1337-llama\/CVE-2020-0688-Python3",
"description": "Exploit updated to use Python 3.", "description": "Exploit updated to use Python 3.",
"fork": false, "fork": false,
"created_at": "2022-10-19T10:36:10Z", "created_at": "2022-10-19T10:36:10Z",

View file

@ -108,13 +108,13 @@
"stargazers_count": 31, "stargazers_count": 31,
"watchers_count": 31, "watchers_count": 31,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 7,
"watchers": 31, "watchers": 31,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)", "description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)",
"fork": false, "fork": false,
"created_at": "2020-08-13T09:03:40Z", "created_at": "2020-08-13T09:03:40Z",
"updated_at": "2023-09-28T11:18:55Z", "updated_at": "2023-10-26T12:24:31Z",
"pushed_at": "2023-09-19T10:38:28Z", "pushed_at": "2023-09-19T10:38:28Z",
"stargazers_count": 46, "stargazers_count": 47,
"watchers_count": 46, "watchers_count": 47,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 46, "watchers": 47,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)", "description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false, "fork": false,
"created_at": "2021-03-11T15:27:25Z", "created_at": "2021-03-11T15:27:25Z",
"updated_at": "2023-10-10T20:18:37Z", "updated_at": "2023-10-26T14:36:46Z",
"pushed_at": "2021-05-25T11:14:56Z", "pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 142, "stargazers_count": 143,
"watchers_count": 142, "watchers_count": 143,
"has_discussions": false, "has_discussions": false,
"forks_count": 34, "forks_count": 34,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 34,
"watchers": 142, "watchers": 143,
"score": 0, "score": 0,
"subscribers_count": 17 "subscribers_count": 17
} }

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC", "description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
"fork": false, "fork": false,
"created_at": "2022-02-18T14:19:58Z", "created_at": "2022-02-18T14:19:58Z",
"updated_at": "2023-09-28T11:36:09Z", "updated_at": "2023-10-26T13:41:47Z",
"pushed_at": "2022-02-19T13:52:32Z", "pushed_at": "2022-02-19T13:52:32Z",
"stargazers_count": 169, "stargazers_count": 168,
"watchers_count": 169, "watchers_count": 168,
"has_discussions": false, "has_discussions": false,
"forks_count": 30, "forks_count": 30,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 30, "forks": 30,
"watchers": 169, "watchers": 168,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)", "description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false, "fork": false,
"created_at": "2021-03-11T15:27:25Z", "created_at": "2021-03-11T15:27:25Z",
"updated_at": "2023-10-10T20:18:37Z", "updated_at": "2023-10-26T14:36:46Z",
"pushed_at": "2021-05-25T11:14:56Z", "pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 142, "stargazers_count": 143,
"watchers_count": 142, "watchers_count": 143,
"has_discussions": false, "has_discussions": false,
"forks_count": 34, "forks_count": 34,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 34,
"watchers": 142, "watchers": 143,
"score": 0, "score": 0,
"subscribers_count": 17 "subscribers_count": 17
} }

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2022-04-26T11:32:34Z", "created_at": "2022-04-26T11:32:34Z",
"updated_at": "2022-04-26T12:12:00Z", "updated_at": "2022-04-26T12:12:00Z",
"pushed_at": "2023-03-01T14:14:45Z", "pushed_at": "2023-10-26T12:57:21Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day", "description": "CVE-2021-4034 1day",
"fork": false, "fork": false,
"created_at": "2022-01-25T23:51:37Z", "created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-10-12T09:02:31Z", "updated_at": "2023-10-26T13:41:47Z",
"pushed_at": "2022-06-08T04:00:28Z", "pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1854, "stargazers_count": 1853,
"watchers_count": 1854, "watchers_count": 1853,
"has_discussions": false, "has_discussions": false,
"forks_count": 513, "forks_count": 513,
"allow_forking": true, "allow_forking": true,
@ -91,7 +91,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 513, "forks": 513,
"watchers": 1854, "watchers": 1853,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-11T15:10:30Z", "created_at": "2021-12-11T15:10:30Z",
"updated_at": "2023-10-21T20:10:01Z", "updated_at": "2023-10-26T15:09:18Z",
"pushed_at": "2022-07-10T22:23:13Z", "pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 934, "stargazers_count": 935,
"watchers_count": 934, "watchers_count": 935,
"has_discussions": false, "has_discussions": false,
"forks_count": 190, "forks_count": 190,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 190, "forks": 190,
"watchers": 934, "watchers": 935,
"score": 0, "score": 0,
"subscribers_count": 25 "subscribers_count": 25
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false, "fork": false,
"created_at": "2021-12-11T19:27:30Z", "created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-10-21T21:38:29Z", "updated_at": "2023-10-26T14:01:29Z",
"pushed_at": "2021-12-16T09:50:15Z", "pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1263, "stargazers_count": 1264,
"watchers_count": 1263, "watchers_count": 1264,
"has_discussions": false, "has_discussions": false,
"forks_count": 318, "forks_count": 318,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 318, "forks": 318,
"watchers": 1263, "watchers": 1264,
"score": 0, "score": 0,
"subscribers_count": 27 "subscribers_count": 27
}, },

View file

@ -1109,5 +1109,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 710352369,
"name": "CVE-2021-43798",
"full_name": "katseyres2\/CVE-2021-43798",
"owner": {
"login": "katseyres2",
"id": 143514320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143514320?v=4",
"html_url": "https:\/\/github.com\/katseyres2"
},
"html_url": "https:\/\/github.com\/katseyres2\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2023-10-26T14:21:49Z",
"updated_at": "2023-10-26T14:23:31Z",
"pushed_at": "2023-10-26T14:23:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false, "fork": false,
"created_at": "2021-12-10T22:35:00Z", "created_at": "2021-12-10T22:35:00Z",
"updated_at": "2023-10-25T05:39:08Z", "updated_at": "2023-10-26T16:03:47Z",
"pushed_at": "2022-01-15T16:18:44Z", "pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 917, "stargazers_count": 918,
"watchers_count": 917, "watchers_count": 918,
"has_discussions": false, "has_discussions": false,
"forks_count": 140, "forks_count": 140,
"allow_forking": true, "allow_forking": true,
@ -889,7 +889,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 140, "forks": 140,
"watchers": 917, "watchers": 918,
"score": 0, "score": 0,
"subscribers_count": 24 "subscribers_count": 24
}, },

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-24990 TerraMaster TOS unauthenticated RCE via PHP Object Instantiation", "description": "CVE-2022-24990 TerraMaster TOS unauthenticated RCE via PHP Object Instantiation",
"fork": false, "fork": false,
"created_at": "2022-03-20T05:15:16Z", "created_at": "2022-03-20T05:15:16Z",
"updated_at": "2023-09-28T11:37:11Z", "updated_at": "2023-10-26T14:49:27Z",
"pushed_at": "2022-04-25T04:58:24Z", "pushed_at": "2022-04-25T04:58:24Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 15, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -103,10 +103,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare", "description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false, "fork": false,
"created_at": "2023-10-17T06:29:44Z", "created_at": "2023-10-17T06:29:44Z",
"updated_at": "2023-10-25T08:42:11Z", "updated_at": "2023-10-26T18:20:09Z",
"pushed_at": "2023-10-23T04:47:11Z", "pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -115,7 +115,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -430,10 +430,10 @@
"description": "A critical command injection vulnerability was found in multiple API endpoints of the Atlassian Bit bucket Server and Data center. This vulnerability affects all versions of Bitbucket Server and Data Center released before versions <7.6.17, <7.17.10, <7.21.4, <8.0.3, <8.1.2, <8.2.2, and <8.3.1", "description": "A critical command injection vulnerability was found in multiple API endpoints of the Atlassian Bit bucket Server and Data center. This vulnerability affects all versions of Bitbucket Server and Data Center released before versions <7.6.17, <7.17.10, <7.21.4, <8.0.3, <8.1.2, <8.2.2, and <8.3.1",
"fork": false, "fork": false,
"created_at": "2023-01-23T12:51:09Z", "created_at": "2023-01-23T12:51:09Z",
"updated_at": "2023-10-11T14:44:51Z", "updated_at": "2023-10-26T14:49:44Z",
"pushed_at": "2023-01-25T10:04:41Z", "pushed_at": "2023-01-25T10:04:41Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -442,7 +442,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 6, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false, "fork": false,
"created_at": "2022-09-12T19:22:44Z", "created_at": "2022-09-12T19:22:44Z",
"updated_at": "2023-10-21T15:12:04Z", "updated_at": "2023-10-26T14:05:38Z",
"pushed_at": "2022-09-19T19:41:34Z", "pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 221, "stargazers_count": 222,
"watchers_count": 221, "watchers_count": 222,
"has_discussions": false, "has_discussions": false,
"forks_count": 36, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 36, "forks": 36,
"watchers": 221, "watchers": 222,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -407,10 +407,10 @@
"description": "This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273", "description": "This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273",
"fork": false, "fork": false,
"created_at": "2023-10-23T19:25:29Z", "created_at": "2023-10-23T19:25:29Z",
"updated_at": "2023-10-26T09:11:42Z", "updated_at": "2023-10-26T14:49:09Z",
"pushed_at": "2023-10-24T18:17:43Z", "pushed_at": "2023-10-24T18:17:43Z",
"stargazers_count": 22, "stargazers_count": 23,
"watchers_count": 22, "watchers_count": 23,
"has_discussions": true, "has_discussions": true,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -419,7 +419,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 22, "watchers": 23,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

32
2023/CVE-2023-20955.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 710323089,
"name": "packages_apps_Settings_AOSP10_r33_CVE-2023-20955",
"full_name": "Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2023-20955",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2023-20955",
"description": null,
"fork": false,
"created_at": "2023-10-26T13:19:06Z",
"updated_at": "2023-10-26T13:22:14Z",
"pushed_at": "2023-10-26T13:22:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -28,5 +28,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 710334684,
"name": "frameworks_base_AOSP10_r33_CVE-2023-21097",
"full_name": "uthrasri\/frameworks_base_AOSP10_r33_CVE-2023-21097",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri"
},
"html_url": "https:\/\/github.com\/uthrasri\/frameworks_base_AOSP10_r33_CVE-2023-21097",
"description": null,
"fork": false,
"created_at": "2023-10-26T13:44:13Z",
"updated_at": "2023-10-26T15:14:58Z",
"pushed_at": "2023-10-26T15:17:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-21707 EXP", "description": "CVE-2023-21707 EXP",
"fork": false, "fork": false,
"created_at": "2023-06-30T10:15:07Z", "created_at": "2023-06-30T10:15:07Z",
"updated_at": "2023-10-24T06:42:30Z", "updated_at": "2023-10-26T18:19:43Z",
"pushed_at": "2023-07-06T07:43:24Z", "pushed_at": "2023-07-06T07:43:24Z",
"stargazers_count": 17, "stargazers_count": 18,
"watchers_count": 17, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 17, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit", "description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false, "fork": false,
"created_at": "2023-10-10T21:40:09Z", "created_at": "2023-10-10T21:40:09Z",
"updated_at": "2023-10-25T20:55:34Z", "updated_at": "2023-10-26T14:24:04Z",
"pushed_at": "2023-10-17T22:04:13Z", "pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 87, "stargazers_count": 88,
"watchers_count": 87, "watchers_count": 88,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -94,7 +94,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 87, "watchers": 88,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-33733 reportlab RCE", "description": "CVE-2023-33733 reportlab RCE",
"fork": false, "fork": false,
"created_at": "2023-05-30T22:22:50Z", "created_at": "2023-05-30T22:22:50Z",
"updated_at": "2023-10-24T06:10:02Z", "updated_at": "2023-10-26T14:44:18Z",
"pushed_at": "2023-09-05T15:49:14Z", "pushed_at": "2023-09-05T15:49:14Z",
"stargazers_count": 81, "stargazers_count": 82,
"watchers_count": 81, "watchers_count": 82,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 81, "watchers": 82,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "VMware Aria Operations for Logs CVE-2023-34051", "description": "VMware Aria Operations for Logs CVE-2023-34051",
"fork": false, "fork": false,
"created_at": "2023-10-20T14:59:45Z", "created_at": "2023-10-20T14:59:45Z",
"updated_at": "2023-10-26T11:56:34Z", "updated_at": "2023-10-26T15:31:22Z",
"pushed_at": "2023-10-20T15:00:10Z", "pushed_at": "2023-10-20T15:00:10Z",
"stargazers_count": 45, "stargazers_count": 48,
"watchers_count": 45, "watchers_count": 48,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 45, "watchers": 48,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -13,10 +13,10 @@
"description": "SCTF 2023 kernel pwn && CVE-2023-3640", "description": "SCTF 2023 kernel pwn && CVE-2023-3640",
"fork": false, "fork": false,
"created_at": "2023-06-20T06:21:04Z", "created_at": "2023-06-20T06:21:04Z",
"updated_at": "2023-09-08T12:10:15Z", "updated_at": "2023-10-26T13:41:49Z",
"pushed_at": "2023-07-17T10:39:37Z", "pushed_at": "2023-07-17T10:39:37Z",
"stargazers_count": 20, "stargazers_count": 19,
"watchers_count": 20, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 20, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)", "description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
"fork": false, "fork": false,
"created_at": "2023-08-12T18:33:57Z", "created_at": "2023-08-12T18:33:57Z",
"updated_at": "2023-09-28T11:46:47Z", "updated_at": "2023-10-26T17:43:39Z",
"pushed_at": "2023-09-07T08:37:04Z", "pushed_at": "2023-09-07T08:37:04Z",
"stargazers_count": 54, "stargazers_count": 55,
"watchers_count": 54, "watchers_count": 55,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 13,
"watchers": 54, "watchers": 55,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-10-23T19:06:36Z", "created_at": "2023-10-23T19:06:36Z",
"updated_at": "2023-10-26T11:55:37Z", "updated_at": "2023-10-26T18:17:19Z",
"pushed_at": "2023-10-23T19:09:36Z", "pushed_at": "2023-10-23T19:09:36Z",
"stargazers_count": 54, "stargazers_count": 58,
"watchers_count": 54, "watchers_count": 58,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 54, "watchers": 58,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
} }

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-36802", "description": "LPE exploit for CVE-2023-36802",
"fork": false, "fork": false,
"created_at": "2023-10-09T17:32:15Z", "created_at": "2023-10-09T17:32:15Z",
"updated_at": "2023-10-26T01:18:03Z", "updated_at": "2023-10-26T15:11:05Z",
"pushed_at": "2023-10-10T17:44:17Z", "pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 112, "stargazers_count": 114,
"watchers_count": 112, "watchers_count": 114,
"has_discussions": false, "has_discussions": false,
"forks_count": 30, "forks_count": 30,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 30, "forks": 30,
"watchers": 112, "watchers": 114,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -78,13 +78,13 @@
"stargazers_count": 24, "stargazers_count": 24,
"watchers_count": 24, "watchers_count": 24,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 24, "watchers": 24,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver", "description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false, "fork": false,
"created_at": "2023-10-23T18:33:41Z", "created_at": "2023-10-23T18:33:41Z",
"updated_at": "2023-10-26T11:39:14Z", "updated_at": "2023-10-26T18:07:46Z",
"pushed_at": "2023-10-26T11:44:46Z", "pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -115,7 +115,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 16, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-10-15T12:14:18Z", "created_at": "2023-10-15T12:14:18Z",
"updated_at": "2023-10-26T07:51:38Z", "updated_at": "2023-10-26T17:48:45Z",
"pushed_at": "2023-10-20T23:04:03Z", "pushed_at": "2023-10-20T23:04:03Z",
"stargazers_count": 144, "stargazers_count": 145,
"watchers_count": 144, "watchers_count": 145,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 144, "watchers": 145,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -13,10 +13,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487", "description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false, "fork": false,
"created_at": "2023-10-10T14:20:42Z", "created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-10-25T09:45:36Z", "updated_at": "2023-10-26T12:26:39Z",
"pushed_at": "2023-10-14T16:43:31Z", "pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 176, "stargazers_count": 177,
"watchers_count": 176, "watchers_count": 177,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 38,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 38,
"watchers": 176, "watchers": 177,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },
@ -141,10 +141,10 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false, "fork": false,
"created_at": "2023-10-13T23:55:32Z", "created_at": "2023-10-13T23:55:32Z",
"updated_at": "2023-10-25T18:27:38Z", "updated_at": "2023-10-26T18:06:54Z",
"pushed_at": "2023-10-16T23:36:45Z", "pushed_at": "2023-10-16T23:36:45Z",
"stargazers_count": 20, "stargazers_count": 21,
"watchers_count": 20, "watchers_count": 21,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -153,7 +153,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 20, "watchers": 21,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -196,5 +196,35 @@
"watchers": 7, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 709722803,
"name": "golang-CVE-2023-44487",
"full_name": "ReToCode\/golang-CVE-2023-44487",
"owner": {
"login": "ReToCode",
"id": 16611466,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16611466?v=4",
"html_url": "https:\/\/github.com\/ReToCode"
},
"html_url": "https:\/\/github.com\/ReToCode\/golang-CVE-2023-44487",
"description": null,
"fork": false,
"created_at": "2023-10-25T09:11:46Z",
"updated_at": "2023-10-26T15:03:08Z",
"pushed_at": "2023-10-26T15:01:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
} }
] ]

32
2023/CVE-2023-46404.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 710370837,
"name": "CVE-2023-46404",
"full_name": "windecks\/CVE-2023-46404",
"owner": {
"login": "windecks",
"id": 55925786,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55925786?v=4",
"html_url": "https:\/\/github.com\/windecks"
},
"html_url": "https:\/\/github.com\/windecks\/CVE-2023-46404",
"description": "PoC and Writeup for CVE-2023-46404.",
"fork": false,
"created_at": "2023-10-26T15:01:32Z",
"updated_at": "2023-10-26T15:07:18Z",
"pushed_at": "2023-10-26T15:10:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-46450.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 710302205,
"name": "-CVE-2023-46450",
"full_name": "yte121\/-CVE-2023-46450",
"owner": {
"login": "yte121",
"id": 55489792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55489792?v=4",
"html_url": "https:\/\/github.com\/yte121"
},
"html_url": "https:\/\/github.com\/yte121\/-CVE-2023-46450",
"description": " CVE-2023-46450 reference",
"fork": false,
"created_at": "2023-10-26T12:30:21Z",
"updated_at": "2023-10-26T12:30:21Z",
"pushed_at": "2023-10-26T14:09:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-46451.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 710303698,
"name": "CVE-2023-46451",
"full_name": "sajaljat\/CVE-2023-46451",
"owner": {
"login": "sajaljat",
"id": 142223862,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
"html_url": "https:\/\/github.com\/sajaljat"
},
"html_url": "https:\/\/github.com\/sajaljat\/CVE-2023-46451",
"description": null,
"fork": false,
"created_at": "2023-10-26T12:34:03Z",
"updated_at": "2023-10-26T12:34:03Z",
"pushed_at": "2023-10-26T12:37:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ", "description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
"fork": false, "fork": false,
"created_at": "2023-10-24T17:19:32Z", "created_at": "2023-10-24T17:19:32Z",
"updated_at": "2023-10-26T06:51:50Z", "updated_at": "2023-10-26T16:07:20Z",
"pushed_at": "2023-10-26T10:39:11Z", "pushed_at": "2023-10-26T14:16:05Z",
"stargazers_count": 13, "stargazers_count": 15,
"watchers_count": 13, "watchers_count": 15,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -41,7 +41,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 13, "watchers": 15,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-5360 Auto Shell Upload WordPress Royal Elementor 1.3.78 Shell Upload", "description": "CVE-2023-5360 Auto Shell Upload WordPress Royal Elementor 1.3.78 Shell Upload",
"fork": false, "fork": false,
"created_at": "2023-10-21T10:51:08Z", "created_at": "2023-10-21T10:51:08Z",
"updated_at": "2023-10-26T01:47:25Z", "updated_at": "2023-10-26T15:23:09Z",
"pushed_at": "2023-10-21T10:52:37Z", "pushed_at": "2023-10-21T10:52:37Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -974,6 +974,13 @@
- [Trinadh465/frameworks_base_CVE-2023-20944](https://github.com/Trinadh465/frameworks_base_CVE-2023-20944) - [Trinadh465/frameworks_base_CVE-2023-20944](https://github.com/Trinadh465/frameworks_base_CVE-2023-20944)
- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944) - [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944)
### CVE-2023-20955 (2023-03-24)
<code>In onPrepareOptionsMenu of AppInfoDashboardFragment.java, there is a possible way to bypass admin restrictions and uninstall applications for all users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258653813
</code>
- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2023-20955](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2023-20955)
### CVE-2023-20963 (2023-03-24) ### CVE-2023-20963 (2023-03-24)
<code>In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519 <code>In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519
@ -1012,6 +1019,7 @@
</code> </code>
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097) - [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097)
- [uthrasri/frameworks_base_AOSP10_r33_CVE-2023-21097](https://github.com/uthrasri/frameworks_base_AOSP10_r33_CVE-2023-21097)
### CVE-2023-21238 (2023-07-12) ### CVE-2023-21238 (2023-07-12)
@ -2442,7 +2450,11 @@
### CVE-2023-31070 ### CVE-2023-31070
- [bugprove/cve-2023-31070](https://github.com/bugprove/cve-2023-31070) - [bugprove/cve-2023-31070](https://github.com/bugprove/cve-2023-31070)
### CVE-2023-31419 ### CVE-2023-31419 (-)
<code>[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]
</code>
- [sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419](https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419) - [sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419](https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419)
- [u238/Elasticsearch-CVE-2023-31419](https://github.com/u238/Elasticsearch-CVE-2023-31419) - [u238/Elasticsearch-CVE-2023-31419](https://github.com/u238/Elasticsearch-CVE-2023-31419)
@ -4558,6 +4570,7 @@
- [pabloec20/rapidreset](https://github.com/pabloec20/rapidreset) - [pabloec20/rapidreset](https://github.com/pabloec20/rapidreset)
- [secengjeff/rapidresetclient](https://github.com/secengjeff/rapidresetclient) - [secengjeff/rapidresetclient](https://github.com/secengjeff/rapidresetclient)
- [studiogangster/CVE-2023-44487](https://github.com/studiogangster/CVE-2023-44487) - [studiogangster/CVE-2023-44487](https://github.com/studiogangster/CVE-2023-44487)
- [ReToCode/golang-CVE-2023-44487](https://github.com/ReToCode/golang-CVE-2023-44487)
### CVE-2023-44758 (2023-10-06) ### CVE-2023-44758 (2023-10-06)
@ -4733,9 +4746,26 @@
### CVE-2023-46197 ### CVE-2023-46197
- [RandomRobbieBF/CVE-2023-46197](https://github.com/RandomRobbieBF/CVE-2023-46197) - [RandomRobbieBF/CVE-2023-46197](https://github.com/RandomRobbieBF/CVE-2023-46197)
### CVE-2023-46449 ### CVE-2023-46404
- [windecks/CVE-2023-46404](https://github.com/windecks/CVE-2023-46404)
### CVE-2023-46449 (2023-10-26)
<code>Sourcecodester Free and Open Source inventory management system v1.0 is vulnerable to Incorrect Access Control. An arbitrary user can change the password of another user and takeover the account via IDOR in the password change function.
</code>
- [sajaljat/CVE-2023-46449](https://github.com/sajaljat/CVE-2023-46449) - [sajaljat/CVE-2023-46449](https://github.com/sajaljat/CVE-2023-46449)
### CVE-2023-46450 (2023-10-26)
<code>Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function.
</code>
- [yte121/-CVE-2023-46450](https://github.com/yte121/-CVE-2023-46450)
### CVE-2023-46451
- [sajaljat/CVE-2023-46451](https://github.com/sajaljat/CVE-2023-46451)
### CVE-2023-51504 ### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@ -16330,6 +16360,7 @@
- [FAOG99/GrafanaDirectoryScanner](https://github.com/FAOG99/GrafanaDirectoryScanner) - [FAOG99/GrafanaDirectoryScanner](https://github.com/FAOG99/GrafanaDirectoryScanner)
- [nuker/CVE-2021-43798](https://github.com/nuker/CVE-2021-43798) - [nuker/CVE-2021-43798](https://github.com/nuker/CVE-2021-43798)
- [victorhorowitz/grafana-exploit-CVE-2021-43798](https://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798) - [victorhorowitz/grafana-exploit-CVE-2021-43798](https://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798)
- [katseyres2/CVE-2021-43798](https://github.com/katseyres2/CVE-2021-43798)
### CVE-2021-43799 (2022-01-25) ### CVE-2021-43799 (2022-01-25)
@ -17861,7 +17892,7 @@
- [MrTiz/CVE-2020-0688](https://github.com/MrTiz/CVE-2020-0688) - [MrTiz/CVE-2020-0688](https://github.com/MrTiz/CVE-2020-0688)
- [ann0906/proxylogon](https://github.com/ann0906/proxylogon) - [ann0906/proxylogon](https://github.com/ann0906/proxylogon)
- [7heKnight/CVE-2020-0688](https://github.com/7heKnight/CVE-2020-0688) - [7heKnight/CVE-2020-0688](https://github.com/7heKnight/CVE-2020-0688)
- [TheKickPuncher/CVE-2020-0688-Python3](https://github.com/TheKickPuncher/CVE-2020-0688-Python3) - [1337-llama/CVE-2020-0688-Python3](https://github.com/1337-llama/CVE-2020-0688-Python3)
- [chudamax/CVE-2020-0688-Exchange2010](https://github.com/chudamax/CVE-2020-0688-Exchange2010) - [chudamax/CVE-2020-0688-Exchange2010](https://github.com/chudamax/CVE-2020-0688-Exchange2010)
### CVE-2020-0728 (2020-02-11) ### CVE-2020-0728 (2020-02-11)
@ -22849,6 +22880,7 @@
</code> </code>
- [StealYourCode/CVE-2019-1663](https://github.com/StealYourCode/CVE-2019-1663) - [StealYourCode/CVE-2019-1663](https://github.com/StealYourCode/CVE-2019-1663)
- [e180175/CVE-2019-1663-vuln](https://github.com/e180175/CVE-2019-1663-vuln)
### CVE-2019-1759 (2019-03-27) ### CVE-2019-1759 (2019-03-27)
@ -35716,6 +35748,13 @@
- [HanseSecure/CVE-2009-1437](https://github.com/HanseSecure/CVE-2009-1437) - [HanseSecure/CVE-2009-1437](https://github.com/HanseSecure/CVE-2009-1437)
### CVE-2009-1904 (2009-06-11)
<code>The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
</code>
- [NZKoz/bigdecimal-segfault-fix](https://github.com/NZKoz/bigdecimal-segfault-fix)
### CVE-2009-2265 (2009-07-05) ### CVE-2009-2265 (2009-07-05)
<code>Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory. <code>Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.