Auto Update 2023/07/25 06:29:22

This commit is contained in:
motikan2010-bot 2023-07-25 15:29:22 +09:00
parent 82e9e7cf74
commit e002124f12
49 changed files with 255 additions and 364 deletions

View file

@ -157,5 +157,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 363438468,
"name": "CVE-2003-0264",
"full_name": "nobodyatall648\/CVE-2003-0264",
"owner": {
"login": "nobodyatall648",
"id": 35725871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
"html_url": "https:\/\/github.com\/nobodyatall648"
},
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2003-0264",
"description": "CVE-2003-0264 SLMail5.5_RemoteBufferOverflow",
"fork": false,
"created_at": "2021-05-01T15:06:44Z",
"updated_at": "2021-06-25T19:06:55Z",
"pushed_at": "2021-06-25T19:06:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

File diff suppressed because one or more lines are too long

View file

@ -1,32 +0,0 @@
[
{
"id": 32724854,
"name": "patch-openssl-CVE-2014-0291_CVE-2015-0204",
"full_name": "niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204",
"owner": {
"login": "niccoX",
"id": 10669660,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10669660?v=4",
"html_url": "https:\/\/github.com\/niccoX"
},
"html_url": "https:\/\/github.com\/niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204",
"description": null,
"fork": false,
"created_at": "2015-03-23T10:18:08Z",
"updated_at": "2018-08-10T09:10:45Z",
"pushed_at": "2015-03-23T13:04:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,34 +1,4 @@
[
{
"id": 33535175,
"name": "Vulnerable-CVE-2014-8609",
"full_name": "locisvv\/Vulnerable-CVE-2014-8609",
"owner": {
"login": "locisvv",
"id": 1533289,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1533289?v=4",
"html_url": "https:\/\/github.com\/locisvv"
},
"html_url": "https:\/\/github.com\/locisvv\/Vulnerable-CVE-2014-8609",
"description": null,
"fork": false,
"created_at": "2015-04-07T09:50:50Z",
"updated_at": "2015-04-07T09:51:37Z",
"pushed_at": "2015-04-07T09:51:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 386988356,
"name": "CVE-2014-8609-POC",

View file

@ -1,32 +0,0 @@
[
{
"id": 50957830,
"name": "cve-2016-0701",
"full_name": "luanjampa\/cve-2016-0701",
"owner": {
"login": "luanjampa",
"id": 4728927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4728927?v=4",
"html_url": "https:\/\/github.com\/luanjampa"
},
"html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701",
"description": null,
"fork": false,
"created_at": "2016-02-02T22:53:34Z",
"updated_at": "2016-02-15T06:03:46Z",
"pushed_at": "2016-02-24T17:32:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 56461631,
"name": "cfengine-CVE-2016-2118",
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
"description": "An example detection and remediation policy.",
"fork": false,
"created_at": "2016-04-17T22:22:04Z",
"updated_at": "2016-04-18T02:57:44Z",
"pushed_at": "2016-04-19T14:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 56758577,
"name": "CVE-2016-3141",
"full_name": "peternguyen93\/CVE-2016-3141",
"owner": {
"login": "peternguyen93",
"id": 1802870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
"html_url": "https:\/\/github.com\/peternguyen93"
},
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
"description": "CVE-2016-3141",
"fork": false,
"created_at": "2016-04-21T08:59:05Z",
"updated_at": "2023-03-11T18:41:15Z",
"pushed_at": "2016-04-23T15:55:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -163,10 +163,10 @@
"description": "Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.",
"fork": false,
"created_at": "2018-04-10T18:34:17Z",
"updated_at": "2023-05-29T12:27:05Z",
"updated_at": "2023-07-25T03:49:42Z",
"pushed_at": "2018-04-17T23:14:39Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false,
"created_at": "2018-03-12T16:44:12Z",
"updated_at": "2023-07-15T09:24:10Z",
"updated_at": "2023-07-25T01:57:28Z",
"pushed_at": "2022-10-18T08:53:13Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 6
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-07-24T06:37:44Z",
"updated_at": "2023-07-25T06:07:20Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1746,
"watchers_count": 1746,
"stargazers_count": 1747,
"watchers_count": 1747,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1746,
"watchers": 1747,
"score": 0,
"subscribers_count": 33
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 111,
"score": 0,
"subscribers_count": 10

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-07-24T06:37:44Z",
"updated_at": "2023-07-25T06:07:20Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1746,
"watchers_count": 1746,
"stargazers_count": 1747,
"watchers_count": 1747,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1746,
"watchers": 1747,
"score": 0,
"subscribers_count": 33
},

View file

@ -13,10 +13,10 @@
"description": "[CVE-2018-5728] Terminal Satelitales Seatel exponen geolocalización ",
"fork": false,
"created_at": "2019-08-29T19:09:35Z",
"updated_at": "2022-11-11T09:37:45Z",
"updated_at": "2023-07-25T02:06:54Z",
"pushed_at": "2019-08-30T23:51:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 3
}

View file

@ -1643,10 +1643,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2023-07-09T08:49:44Z",
"updated_at": "2023-07-25T04:14:55Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 883,
"watchers_count": 883,
"stargazers_count": 882,
"watchers_count": 882,
"has_discussions": false,
"forks_count": 292,
"allow_forking": true,
@ -1655,7 +1655,7 @@
"topics": [],
"visibility": "public",
"forks": 292,
"watchers": 883,
"watchers": 882,
"score": 0,
"subscribers_count": 55
},

View file

@ -354,7 +354,7 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -370,7 +370,7 @@
"whatsapp-chat"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 22,
"score": 0,
"subscribers_count": 2

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-07-24T06:37:44Z",
"updated_at": "2023-07-25T06:07:20Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1746,
"watchers_count": 1746,
"stargazers_count": 1747,
"watchers_count": 1747,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1746,
"watchers": 1747,
"score": 0,
"subscribers_count": 33
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 262,
"watchers_count": 262,
"has_discussions": false,
"forks_count": 87,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 87,
"forks": 88,
"watchers": 262,
"score": 0,
"subscribers_count": 15

View file

@ -13,7 +13,7 @@
"description": "Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.",
"fork": false,
"created_at": "2020-05-08T15:56:26Z",
"updated_at": "2023-04-04T10:32:23Z",
"updated_at": "2023-07-25T03:29:06Z",
"pushed_at": "2020-05-08T17:10:48Z",
"stargazers_count": 31,
"watchers_count": 31,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-07-24T06:37:44Z",
"updated_at": "2023-07-25T06:07:20Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1746,
"watchers_count": 1746,
"stargazers_count": 1747,
"watchers_count": 1747,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1746,
"watchers": 1747,
"score": 0,
"subscribers_count": 33
},

View file

@ -108,10 +108,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2023-07-23T15:44:09Z",
"updated_at": "2023-07-25T02:10:39Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 510,
"watchers_count": 510,
"stargazers_count": 511,
"watchers_count": 511,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 510,
"watchers": 511,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-4464 \/ CVE-2020-4450",
"fork": false,
"created_at": "2021-08-17T08:44:49Z",
"updated_at": "2023-02-13T09:02:41Z",
"updated_at": "2023-07-25T03:14:10Z",
"pushed_at": "2021-08-24T15:02:19Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 6
},

View file

@ -163,10 +163,10 @@
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false,
"created_at": "2020-06-05T20:40:28Z",
"updated_at": "2023-07-07T19:07:09Z",
"updated_at": "2023-07-25T02:12:30Z",
"pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2023-07-07T19:07:10Z",
"updated_at": "2023-07-25T02:12:32Z",
"pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 4
},

View file

@ -79,19 +79,19 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-07-24T01:58:04Z",
"updated_at": "2023-07-25T06:21:36Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 513,
"forks_count": 512,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 513,
"watchers": 1837,
"forks": 512,
"watchers": 1838,
"score": 0,
"subscribers_count": 21
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-07-24T18:17:41Z",
"updated_at": "2023-07-25T05:02:16Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1620,
"watchers_count": 1620,
"stargazers_count": 1621,
"watchers_count": 1621,
"has_discussions": false,
"forks_count": 476,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 476,
"watchers": 1620,
"watchers": 1621,
"score": 0,
"subscribers_count": 25
},
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-07-21T22:34:49Z",
"updated_at": "2023-07-25T03:50:23Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 707,
"watchers_count": 707,
"stargazers_count": 708,
"watchers_count": 708,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 707,
"watchers": 708,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2023-07-12T04:23:30Z",
"updated_at": "2023-07-25T02:12:33Z",
"pushed_at": "2022-04-25T04:11:33Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 359,
"watchers": 360,
"score": 0,
"subscribers_count": 38
},

View file

@ -380,10 +380,10 @@
"description": "Exploit and Check Script for CVE 2022-1388",
"fork": false,
"created_at": "2022-05-09T11:30:09Z",
"updated_at": "2023-07-18T21:09:50Z",
"updated_at": "2023-07-25T02:12:34Z",
"pushed_at": "2022-05-26T23:51:01Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -392,7 +392,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2023-07-21T03:20:55Z",
"pushed_at": "2022-09-21T12:36:55Z",
"stargazers_count": 414,
"watchers_count": 414,
"updated_at": "2023-07-25T02:48:10Z",
"pushed_at": "2023-07-25T02:38:31Z",
"stargazers_count": 416,
"watchers_count": 416,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 414,
"watchers": 416,
"score": 0,
"subscribers_count": 14
}

View file

@ -43,10 +43,10 @@
"description": "Oracle E-BS CVE-2022-21587 Exploit",
"fork": false,
"created_at": "2023-02-12T14:37:56Z",
"updated_at": "2023-07-06T01:21:44Z",
"updated_at": "2023-07-25T03:23:41Z",
"pushed_at": "2023-02-14T03:46:20Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2023-07-07T19:11:57Z",
"updated_at": "2023-07-25T01:43:15Z",
"pushed_at": "2022-08-30T13:23:51Z",
"stargazers_count": 259,
"watchers_count": 259,
"stargazers_count": 260,
"watchers_count": 260,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 259,
"watchers": 260,
"score": 0,
"subscribers_count": 14
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-12-23T10:41:44Z",
"updated_at": "2023-03-10T01:13:38Z",
"pushed_at": "2023-05-30T02:02:34Z",
"pushed_at": "2023-07-25T05:10:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -44,7 +44,7 @@
"fork": false,
"created_at": "2022-12-23T12:33:21Z",
"updated_at": "2023-03-10T01:15:25Z",
"pushed_at": "2023-05-29T23:58:30Z",
"pushed_at": "2023-07-25T05:17:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -321,10 +321,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2023-07-19T15:56:19Z",
"updated_at": "2023-07-25T03:27:52Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 338,
"watchers_count": 338,
"stargazers_count": 339,
"watchers_count": 339,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 338,
"watchers": 339,
"score": 0,
"subscribers_count": 6
},

View file

@ -47,10 +47,10 @@
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
"fork": false,
"created_at": "2023-02-23T10:04:58Z",
"updated_at": "2023-07-05T10:36:47Z",
"updated_at": "2023-07-25T06:13:54Z",
"pushed_at": "2023-03-14T08:41:51Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 88,
"watchers": 93,
"score": 0,
"subscribers_count": 1
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2023-07-03T17:13:17Z",
"pushed_at": "2023-06-02T08:29:26Z",
"pushed_at": "2023-07-25T04:48:06Z",
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "A collection of resources and information about CVE-2023-2033",
"fork": false,
"created_at": "2023-04-26T15:24:02Z",
"updated_at": "2023-07-18T04:59:31Z",
"updated_at": "2023-07-25T04:31:53Z",
"pushed_at": "2023-07-06T02:55:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -108,10 +108,10 @@
"description": "CVE-2023-21839 Python版本",
"fork": false,
"created_at": "2023-04-15T08:57:10Z",
"updated_at": "2023-07-03T08:26:09Z",
"updated_at": "2023-07-25T05:50:51Z",
"pushed_at": "2023-04-21T07:53:54Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -109,10 +109,10 @@
"description": "GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)",
"fork": false,
"created_at": "2023-06-11T18:57:18Z",
"updated_at": "2023-07-18T06:59:39Z",
"updated_at": "2023-07-25T06:15:15Z",
"pushed_at": "2023-06-11T20:18:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -121,7 +121,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-07-11T18:08:05Z",
"updated_at": "2023-07-23T21:23:58Z",
"pushed_at": "2023-07-12T01:37:53Z",
"pushed_at": "2023-07-25T00:59:20Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -103,10 +103,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2023-07-24T10:35:17Z",
"updated_at": "2023-07-25T04:32:27Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 78,
"watchers": 82,
"score": 0,
"subscribers_count": 3
},

View file

@ -57,6 +57,6 @@
"forks": 6,
"watchers": 6,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -45,10 +45,10 @@
"description": "The script is designed to facilitate testing and exploration of the IKEv2 protocol in vulnerable devices, based on Rapid7's exploitation techniques.",
"fork": false,
"created_at": "2023-06-03T15:40:50Z",
"updated_at": "2023-07-16T16:00:40Z",
"updated_at": "2023-07-25T04:43:15Z",
"pushed_at": "2023-06-03T15:45:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-07-24T17:41:37Z",
"updated_at": "2023-07-25T02:37:19Z",
"pushed_at": "2023-07-24T18:08:05Z",
"stargazers_count": 298,
"watchers_count": 298,
"stargazers_count": 297,
"watchers_count": 297,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 298,
"watchers": 297,
"score": 0,
"subscribers_count": 19
}

32
2023/CVE-2023-33802.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 642286308,
"name": "CVE-2023-33802",
"full_name": "CDACesec\/CVE-2023-33802",
"owner": {
"login": "CDACesec",
"id": 102668343,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102668343?v=4",
"html_url": "https:\/\/github.com\/CDACesec"
},
"html_url": "https:\/\/github.com\/CDACesec\/CVE-2023-33802",
"description": null,
"fork": false,
"created_at": "2023-05-18T08:23:38Z",
"updated_at": "2023-07-25T05:08:50Z",
"pushed_at": "2023-07-25T05:21:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -181,6 +181,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

32
2023/CVE-2023-35086.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 670403567,
"name": "CVE-2023-35086-POC",
"full_name": "tin-z\/CVE-2023-35086-POC",
"owner": {
"login": "tin-z",
"id": 32848129,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32848129?v=4",
"html_url": "https:\/\/github.com\/tin-z"
},
"html_url": "https:\/\/github.com\/tin-z\/CVE-2023-35086-POC",
"description": "POC of CVE-2023-35086 only DoS",
"fork": false,
"created_at": "2023-07-25T01:36:07Z",
"updated_at": "2023-07-25T05:26:50Z",
"pushed_at": "2023-07-25T01:42:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Citrix Scanner for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T13:16:38Z",
"updated_at": "2023-07-24T10:55:59Z",
"updated_at": "2023-07-25T02:44:30Z",
"pushed_at": "2023-07-24T11:49:37Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 32,
"watchers": 34,
"score": 0,
"subscribers_count": 4
},
@ -47,10 +47,10 @@
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
"updated_at": "2023-07-24T21:48:37Z",
"updated_at": "2023-07-25T03:04:19Z",
"pushed_at": "2023-07-23T03:54:44Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 1
},
@ -186,7 +186,7 @@
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 669325742,
@ -250,7 +250,7 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 670205651,
@ -280,6 +280,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Cloudpanel 0-day Exploit",
"fork": false,
"created_at": "2023-06-08T09:20:22Z",
"updated_at": "2023-07-24T14:35:13Z",
"updated_at": "2023-07-25T01:21:25Z",
"pushed_at": "2023-07-24T01:43:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2023-07-21T01:53:10Z",
"updated_at": "2023-07-24T19:42:05Z",
"updated_at": "2023-07-25T05:54:17Z",
"pushed_at": "2023-07-21T01:56:59Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,9 +27,9 @@
"exploit-development"
],
"visibility": "public",
"forks": 12,
"watchers": 21,
"forks": 13,
"watchers": 26,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -2036,6 +2036,9 @@
- [s0tr/CVE-2023-33782](https://github.com/s0tr/CVE-2023-33782)
### CVE-2023-33802
- [CDACesec/CVE-2023-33802](https://github.com/CDACesec/CVE-2023-33802)
### CVE-2023-33817 (2023-06-13)
<code>hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability.
@ -2213,6 +2216,13 @@
- [AgentY0/CVE-2023-34965](https://github.com/AgentY0/CVE-2023-34965)
### CVE-2023-35086 (2023-07-21)
<code>\nIt is identified a format string vulnerability in ASUS RT-AX56U V2 &amp; RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. An unauthenticated remote attacker without privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\nThis issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.\n\n
</code>
- [tin-z/CVE-2023-35086-POC](https://github.com/tin-z/CVE-2023-35086-POC)
### CVE-2023-35744
- [ADSSA-IT/CVE-2023-35744](https://github.com/ADSSA-IT/CVE-2023-35744)
@ -29046,13 +29056,6 @@
- [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln)
- [BabyTeam1024/CVE-2016-0638](https://github.com/BabyTeam1024/CVE-2016-0638)
### CVE-2016-0701 (2016-02-14)
<code>The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
</code>
- [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701)
### CVE-2016-0728 (2016-02-07)
<code>The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
@ -29254,13 +29257,6 @@
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
### CVE-2016-2118 (2016-04-12)
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka &quot;BADLOCK.&quot;
</code>
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
### CVE-2016-2173 (2017-04-21)
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
@ -29382,13 +29378,6 @@
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
### CVE-2016-3141 (2016-03-31)
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
</code>
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
### CVE-2016-3238 (2016-07-12)
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka &quot;Windows Print Spooler Remote Code Execution Vulnerability.&quot;
@ -31103,7 +31092,6 @@
- [OffensivePython/HeartLeak](https://github.com/OffensivePython/HeartLeak)
- [vortextube/ssl_scanner](https://github.com/vortextube/ssl_scanner)
- [mpgn/heartbleed-PoC](https://github.com/mpgn/heartbleed-PoC)
- [xanas/heartbleed.py](https://github.com/xanas/heartbleed.py)
- [iSCInc/heartbleed](https://github.com/iSCInc/heartbleed)
- [marstornado/cve-2014-0160-Yunfeng-Jiang](https://github.com/marstornado/cve-2014-0160-Yunfeng-Jiang)
- [hmlio/vaas-cve-2014-0160](https://github.com/hmlio/vaas-cve-2014-0160)
@ -31177,9 +31165,6 @@
- [Charmve/PyStegosploit](https://github.com/Charmve/PyStegosploit)
### CVE-2014-0291
- [niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204](https://github.com/niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204)
### CVE-2014-0472 (2014-04-23)
<code>The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a &quot;dotted Python path.&quot;
@ -31734,7 +31719,6 @@
<code>The addAccount method in src/com/android/settings/accounts/AddAccountSettings.java in the Settings application in Android before 5.0.0 does not properly create a PendingIntent, which allows attackers to use the SYSTEM uid for broadcasting an intent with arbitrary component, action, or category information via a third-party authenticator in a crafted application, aka Bug 17356824.
</code>
- [locisvv/Vulnerable-CVE-2014-8609](https://github.com/locisvv/Vulnerable-CVE-2014-8609)
- [MazX0p/CVE-2014-8609-POC](https://github.com/MazX0p/CVE-2014-8609-POC)
- [ratiros01/CVE-2014-8609-exploit](https://github.com/ratiros01/CVE-2014-8609-exploit)
@ -33491,6 +33475,7 @@
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
- [SxNade/CVE-2003-0264_EXPLOIT](https://github.com/SxNade/CVE-2003-0264_EXPLOIT)
- [nobodyatall648/CVE-2003-0264](https://github.com/nobodyatall648/CVE-2003-0264)
### CVE-2003-0282 (2003-05-14)