mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/11/26 12:32:21
This commit is contained in:
parent
b470abca6c
commit
ed4e2a1435
36 changed files with 188 additions and 157 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2023-11-08T23:11:04Z",
|
||||
"updated_at": "2023-11-26T06:04:20Z",
|
||||
"pushed_at": "2023-09-12T16:52:26Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 7481496,
|
||||
"name": "diaggetroot",
|
||||
"full_name": "hiikezoe\/diaggetroot",
|
||||
"owner": {
|
||||
"login": "hiikezoe",
|
||||
"id": 188175,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4",
|
||||
"html_url": "https:\/\/github.com\/hiikezoe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hiikezoe\/diaggetroot",
|
||||
"description": "Obtain root access through CVE-2012-4220",
|
||||
"fork": false,
|
||||
"created_at": "2013-01-07T11:45:35Z",
|
||||
"updated_at": "2023-09-28T10:21:15Z",
|
||||
"pushed_at": "2013-04-03T11:58:57Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 11198771,
|
||||
"name": "root-zte-open",
|
||||
|
|
32
2012/CVE-2012-5958.json
Normal file
32
2012/CVE-2012-5958.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 9437130,
|
||||
"name": "vulnupnp",
|
||||
"full_name": "lochiiconnectivity\/vulnupnp",
|
||||
"owner": {
|
||||
"login": "lochiiconnectivity",
|
||||
"id": 4155305,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4",
|
||||
"html_url": "https:\/\/github.com\/lochiiconnectivity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp",
|
||||
"description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959",
|
||||
"fork": false,
|
||||
"created_at": "2013-04-14T23:34:56Z",
|
||||
"updated_at": "2016-09-04T16:49:13Z",
|
||||
"pushed_at": "2013-04-14T23:37:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-24T19:58:03Z",
|
||||
"updated_at": "2023-11-26T10:04:08Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1836,
|
||||
"watchers_count": 1836,
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"has_discussions": false,
|
||||
"forks_count": 338,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 338,
|
||||
"watchers": 1836,
|
||||
"watchers": 1837,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-24T19:58:03Z",
|
||||
"updated_at": "2023-11-26T10:04:08Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1836,
|
||||
"watchers_count": 1836,
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"has_discussions": false,
|
||||
"forks_count": 338,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 338,
|
||||
"watchers": 1836,
|
||||
"watchers": 1837,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-24T19:58:03Z",
|
||||
"updated_at": "2023-11-26T10:04:08Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1836,
|
||||
"watchers_count": 1836,
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"has_discussions": false,
|
||||
"forks_count": 338,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 338,
|
||||
"watchers": 1836,
|
||||
"watchers": 1837,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -224,7 +224,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-20T19:50:57Z",
|
||||
"updated_at": "2023-11-20T20:13:15Z",
|
||||
"pushed_at": "2023-11-20T21:04:57Z",
|
||||
"pushed_at": "2023-11-26T11:31:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -587,10 +587,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-24T19:58:03Z",
|
||||
"updated_at": "2023-11-26T10:04:08Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1836,
|
||||
"watchers_count": 1836,
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"has_discussions": false,
|
||||
"forks_count": 338,
|
||||
"allow_forking": true,
|
||||
|
@ -620,7 +620,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 338,
|
||||
"watchers": 1836,
|
||||
"watchers": 1837,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2023-10-17T19:45:47Z",
|
||||
"updated_at": "2023-11-26T07:23:01Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-24T19:58:03Z",
|
||||
"updated_at": "2023-11-26T10:04:08Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1836,
|
||||
"watchers_count": 1836,
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"has_discussions": false,
|
||||
"forks_count": 338,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 338,
|
||||
"watchers": 1836,
|
||||
"watchers": 1837,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
}
|
||||
|
|
|
@ -1444,10 +1444,10 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2023-11-24T20:01:38Z",
|
||||
"updated_at": "2023-11-26T09:51:11Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"stargazers_count": 503,
|
||||
"watchers_count": 503,
|
||||
"has_discussions": false,
|
||||
"forks_count": 163,
|
||||
"allow_forking": true,
|
||||
|
@ -1462,7 +1462,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 163,
|
||||
"watchers": 502,
|
||||
"watchers": 503,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-24T19:58:03Z",
|
||||
"updated_at": "2023-11-26T10:04:08Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1836,
|
||||
"watchers_count": 1836,
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"has_discussions": false,
|
||||
"forks_count": 338,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 338,
|
||||
"watchers": 1836,
|
||||
"watchers": 1837,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit forCVE-2020-29607",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-24T07:20:18Z",
|
||||
"updated_at": "2023-11-24T09:27:14Z",
|
||||
"updated_at": "2023-11-26T08:30:26Z",
|
||||
"pushed_at": "2023-11-24T09:33:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-20253: Privilege Escalation via Job Isolation Escape in Ansible Tower",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-25T18:56:51Z",
|
||||
"updated_at": "2023-11-25T19:22:26Z",
|
||||
"updated_at": "2023-11-26T12:24:16Z",
|
||||
"pushed_at": "2023-11-25T19:18:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -1966,10 +1966,10 @@
|
|||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2023-11-24T20:20:53Z",
|
||||
"updated_at": "2023-11-26T11:45:59Z",
|
||||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -1990,7 +1990,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 630,
|
||||
"watchers": 629,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -5560,10 +5560,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2023-11-16T14:33:36Z",
|
||||
"updated_at": "2023-11-26T11:33:23Z",
|
||||
"pushed_at": "2023-04-06T18:09:41Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -5578,7 +5578,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 372,
|
||||
"watchers": 373,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -1190,13 +1190,13 @@
|
|||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"has_discussions": false,
|
||||
"forks_count": 132,
|
||||
"forks_count": 133,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 132,
|
||||
"forks": 133,
|
||||
"watchers": 473,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "\"qs\" prototype poisoning vulnerability ( CVE-2022-24999 )",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T06:46:49Z",
|
||||
"updated_at": "2023-11-08T09:25:24Z",
|
||||
"updated_at": "2023-11-26T07:59:02Z",
|
||||
"pushed_at": "2022-10-13T12:48:39Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-11-24T20:25:39Z",
|
||||
"updated_at": "2023-11-26T06:56:58Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1075,
|
||||
"watchers_count": 1075,
|
||||
"stargazers_count": 1076,
|
||||
"watchers_count": 1076,
|
||||
"has_discussions": true,
|
||||
"forks_count": 185,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 185,
|
||||
"watchers": 1075,
|
||||
"watchers": 1076,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-32947 walkthough and demo",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T08:21:47Z",
|
||||
"updated_at": "2023-11-21T20:39:16Z",
|
||||
"updated_at": "2023-11-26T07:23:00Z",
|
||||
"pushed_at": "2023-09-18T03:04:48Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 37,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Research into CVE-2022-41853. Using static functions to obtian RCE via Java Deserialization",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-24T10:30:56Z",
|
||||
"updated_at": "2023-11-25T21:39:42Z",
|
||||
"updated_at": "2023-11-26T12:24:34Z",
|
||||
"pushed_at": "2023-11-24T11:44:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T21:40:09Z",
|
||||
"updated_at": "2023-11-22T02:00:37Z",
|
||||
"updated_at": "2023-11-26T08:10:17Z",
|
||||
"pushed_at": "2023-10-17T22:04:13Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-26269: Misconfigured JMX in Apache James",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-23T21:55:30Z",
|
||||
"updated_at": "2023-11-25T21:41:29Z",
|
||||
"updated_at": "2023-11-26T12:24:28Z",
|
||||
"pushed_at": "2023-11-23T22:10:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T09:19:23Z",
|
||||
"updated_at": "2023-11-24T10:18:19Z",
|
||||
"updated_at": "2023-11-26T09:17:48Z",
|
||||
"pushed_at": "2023-11-15T08:35:06Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-34468: Remote Code Execution via DB Components in Apache NiFi",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-25T12:21:48Z",
|
||||
"updated_at": "2023-11-26T04:32:56Z",
|
||||
"updated_at": "2023-11-26T12:24:23Z",
|
||||
"pushed_at": "2023-11-25T12:50:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-05T16:33:32Z",
|
||||
"updated_at": "2023-11-24T08:35:50Z",
|
||||
"updated_at": "2023-11-26T12:24:31Z",
|
||||
"pushed_at": "2023-11-24T12:55:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 20,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -44,11 +44,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-11-25T16:37:20Z",
|
||||
"pushed_at": "2023-11-06T10:49:40Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"forks_count": 128,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"forks": 128,
|
||||
"watchers": 705,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T10:32:31Z",
|
||||
"updated_at": "2023-11-26T05:16:40Z",
|
||||
"updated_at": "2023-11-26T11:06:51Z",
|
||||
"pushed_at": "2023-11-21T10:45:58Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 113,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -349,10 +349,10 @@
|
|||
"description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-24T18:26:36Z",
|
||||
"updated_at": "2023-11-25T12:56:11Z",
|
||||
"updated_at": "2023-11-26T06:49:06Z",
|
||||
"pushed_at": "2023-11-24T20:19:44Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -361,7 +361,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 24,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -257,10 +257,10 @@
|
|||
"description": "Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T07:44:16Z",
|
||||
"updated_at": "2023-11-25T15:28:13Z",
|
||||
"updated_at": "2023-11-26T08:35:11Z",
|
||||
"pushed_at": "2023-10-18T04:59:50Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -269,7 +269,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-24T17:19:32Z",
|
||||
"updated_at": "2023-11-25T16:48:28Z",
|
||||
"updated_at": "2023-11-26T08:13:25Z",
|
||||
"pushed_at": "2023-10-26T14:16:05Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 723561577,
|
||||
"name": "CVE-2023-5561",
|
||||
"full_name": "justhx0r\/CVE-2023-5561",
|
||||
"owner": {
|
||||
"login": "justhx0r",
|
||||
"id": 114948024,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114948024?v=4",
|
||||
"html_url": "https:\/\/github.com\/justhx0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/justhx0r\/CVE-2023-5561",
|
||||
"description": "CVE-2023-5561",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-26T03:47:33Z",
|
||||
"updated_at": "2023-11-26T03:47:59Z",
|
||||
"pushed_at": "2023-11-26T03:49:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -928,13 +928,6 @@
|
|||
|
||||
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
|
||||
|
||||
### CVE-2023-5561 (2023-10-16)
|
||||
|
||||
<code>WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
|
||||
</code>
|
||||
|
||||
- [justhx0r/CVE-2023-5561](https://github.com/justhx0r/CVE-2023-5561)
|
||||
|
||||
### CVE-2023-5965
|
||||
- [pedrojosenavasperez/cve-2023-5965](https://github.com/pedrojosenavasperez/cve-2023-5965)
|
||||
|
||||
|
@ -36421,6 +36414,7 @@
|
|||
<code>diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
|
||||
</code>
|
||||
|
||||
- [hiikezoe/diaggetroot](https://github.com/hiikezoe/diaggetroot)
|
||||
- [poliva/root-zte-open](https://github.com/poliva/root-zte-open)
|
||||
|
||||
### CVE-2012-4431 (2012-12-19)
|
||||
|
@ -36493,6 +36487,13 @@
|
|||
### CVE-2012-5664
|
||||
- [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test)
|
||||
|
||||
### CVE-2012-5958 (2013-01-31)
|
||||
|
||||
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
|
||||
</code>
|
||||
|
||||
- [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp)
|
||||
|
||||
### CVE-2012-5960 (2013-01-31)
|
||||
|
||||
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.
|
||||
|
|
Loading…
Add table
Reference in a new issue