Auto Update 2023/11/26 12:32:21

This commit is contained in:
motikan2010-bot 2023-11-26 21:32:21 +09:00
parent b470abca6c
commit ed4e2a1435
36 changed files with 188 additions and 157 deletions

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2023-11-08T23:11:04Z",
"updated_at": "2023-11-26T06:04:20Z",
"pushed_at": "2023-09-12T16:52:26Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 155,
"watchers": 156,
"score": 0,
"subscribers_count": 7
}

View file

@ -1,4 +1,34 @@
[
{
"id": 7481496,
"name": "diaggetroot",
"full_name": "hiikezoe\/diaggetroot",
"owner": {
"login": "hiikezoe",
"id": 188175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4",
"html_url": "https:\/\/github.com\/hiikezoe"
},
"html_url": "https:\/\/github.com\/hiikezoe\/diaggetroot",
"description": "Obtain root access through CVE-2012-4220",
"fork": false,
"created_at": "2013-01-07T11:45:35Z",
"updated_at": "2023-09-28T10:21:15Z",
"pushed_at": "2013-04-03T11:58:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 12,
"score": 0,
"subscribers_count": 4
},
{
"id": 11198771,
"name": "root-zte-open",

32
2012/CVE-2012-5958.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 9437130,
"name": "vulnupnp",
"full_name": "lochiiconnectivity\/vulnupnp",
"owner": {
"login": "lochiiconnectivity",
"id": 4155305,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4",
"html_url": "https:\/\/github.com\/lochiiconnectivity"
},
"html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp",
"description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959",
"fork": false,
"created_at": "2013-04-14T23:34:56Z",
"updated_at": "2016-09-04T16:49:13Z",
"pushed_at": "2013-04-14T23:37:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T19:58:03Z",
"updated_at": "2023-11-26T10:04:08Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1836,
"watchers_count": 1836,
"stargazers_count": 1837,
"watchers_count": 1837,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1836,
"watchers": 1837,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T19:58:03Z",
"updated_at": "2023-11-26T10:04:08Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1836,
"watchers_count": 1836,
"stargazers_count": 1837,
"watchers_count": 1837,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1836,
"watchers": 1837,
"score": 0,
"subscribers_count": 34
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 30,
"score": 0,
"subscribers_count": 5

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T19:58:03Z",
"updated_at": "2023-11-26T10:04:08Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1836,
"watchers_count": 1836,
"stargazers_count": 1837,
"watchers_count": 1837,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1836,
"watchers": 1837,
"score": 0,
"subscribers_count": 34
},

View file

@ -224,7 +224,7 @@
"fork": false,
"created_at": "2023-11-20T19:50:57Z",
"updated_at": "2023-11-20T20:13:15Z",
"pushed_at": "2023-11-20T21:04:57Z",
"pushed_at": "2023-11-26T11:31:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T19:58:03Z",
"updated_at": "2023-11-26T10:04:08Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1836,
"watchers_count": 1836,
"stargazers_count": 1837,
"watchers_count": 1837,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1836,
"watchers": 1837,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2023-10-17T19:45:47Z",
"updated_at": "2023-11-26T07:23:01Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 314,
"watchers_count": 314,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 314,
"watchers": 315,
"score": 0,
"subscribers_count": 8
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T19:58:03Z",
"updated_at": "2023-11-26T10:04:08Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1836,
"watchers_count": 1836,
"stargazers_count": 1837,
"watchers_count": 1837,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1836,
"watchers": 1837,
"score": 0,
"subscribers_count": 34
}

View file

@ -1444,10 +1444,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2023-11-24T20:01:38Z",
"updated_at": "2023-11-26T09:51:11Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 502,
"watchers_count": 502,
"stargazers_count": 503,
"watchers_count": 503,
"has_discussions": false,
"forks_count": 163,
"allow_forking": true,
@ -1462,7 +1462,7 @@
],
"visibility": "public",
"forks": 163,
"watchers": 502,
"watchers": 503,
"score": 0,
"subscribers_count": 26
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T19:58:03Z",
"updated_at": "2023-11-26T10:04:08Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1836,
"watchers_count": 1836,
"stargazers_count": 1837,
"watchers_count": 1837,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1836,
"watchers": 1837,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "Exploit forCVE-2020-29607",
"fork": false,
"created_at": "2023-11-24T07:20:18Z",
"updated_at": "2023-11-24T09:27:14Z",
"updated_at": "2023-11-26T08:30:26Z",
"pushed_at": "2023-11-24T09:33:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-20253: Privilege Escalation via Job Isolation Escape in Ansible Tower",
"fork": false,
"created_at": "2023-11-25T18:56:51Z",
"updated_at": "2023-11-25T19:22:26Z",
"updated_at": "2023-11-26T12:24:16Z",
"pushed_at": "2023-11-25T19:18:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2023-11-24T20:20:53Z",
"updated_at": "2023-11-26T11:45:59Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 630,
"watchers_count": 630,
"stargazers_count": 629,
"watchers_count": 629,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 630,
"watchers": 629,
"score": 0,
"subscribers_count": 28
},
@ -5560,10 +5560,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2023-11-16T14:33:36Z",
"updated_at": "2023-11-26T11:33:23Z",
"pushed_at": "2023-04-06T18:09:41Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 373,
"watchers_count": 373,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -5578,7 +5578,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 372,
"watchers": 373,
"score": 0,
"subscribers_count": 12
},

View file

@ -1190,13 +1190,13 @@
"stargazers_count": 473,
"watchers_count": 473,
"has_discussions": false,
"forks_count": 132,
"forks_count": 133,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 132,
"forks": 133,
"watchers": 473,
"score": 0,
"subscribers_count": 15

View file

@ -13,10 +13,10 @@
"description": "\"qs\" prototype poisoning vulnerability ( CVE-2022-24999 )",
"fork": false,
"created_at": "2022-04-18T06:46:49Z",
"updated_at": "2023-11-08T09:25:24Z",
"updated_at": "2023-11-26T07:59:02Z",
"pushed_at": "2022-10-13T12:48:39Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-11-24T20:25:39Z",
"updated_at": "2023-11-26T06:56:58Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1075,
"watchers_count": 1075,
"stargazers_count": 1076,
"watchers_count": 1076,
"has_discussions": true,
"forks_count": 185,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 185,
"watchers": 1075,
"watchers": 1076,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-32947 walkthough and demo",
"fork": false,
"created_at": "2023-09-17T08:21:47Z",
"updated_at": "2023-11-21T20:39:16Z",
"updated_at": "2023-11-26T07:23:00Z",
"pushed_at": "2023-09-18T03:04:48Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 127,
"watchers": 128,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 37,
"watchers": 120,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "Research into CVE-2022-41853. Using static functions to obtian RCE via Java Deserialization",
"fork": false,
"created_at": "2023-11-24T10:30:56Z",
"updated_at": "2023-11-25T21:39:42Z",
"updated_at": "2023-11-26T12:24:34Z",
"pushed_at": "2023-11-24T11:44:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2023-11-22T02:00:37Z",
"updated_at": "2023-11-26T08:10:17Z",
"pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 107,
"watchers": 108,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-26269: Misconfigured JMX in Apache James",
"fork": false,
"created_at": "2023-11-23T21:55:30Z",
"updated_at": "2023-11-25T21:41:29Z",
"updated_at": "2023-11-26T12:24:28Z",
"pushed_at": "2023-11-23T22:10:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
"fork": false,
"created_at": "2023-11-09T09:19:23Z",
"updated_at": "2023-11-24T10:18:19Z",
"updated_at": "2023-11-26T09:17:48Z",
"pushed_at": "2023-11-15T08:35:06Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34468: Remote Code Execution via DB Components in Apache NiFi",
"fork": false,
"created_at": "2023-11-25T12:21:48Z",
"updated_at": "2023-11-26T04:32:56Z",
"updated_at": "2023-11-26T12:24:23Z",
"pushed_at": "2023-11-25T12:50:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)",
"fork": false,
"created_at": "2023-11-05T16:33:32Z",
"updated_at": "2023-11-24T08:35:50Z",
"updated_at": "2023-11-26T12:24:31Z",
"pushed_at": "2023-11-24T12:55:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -108,13 +108,13 @@
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 78,
"score": 0,
"subscribers_count": 2

View file

@ -44,11 +44,11 @@
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-11-25T16:37:20Z",
"pushed_at": "2023-11-06T10:49:40Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 705,
"watchers_count": 705,
"has_discussions": false,
"forks_count": 129,
"forks_count": 128,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"exploit"
],
"visibility": "public",
"forks": 129,
"forks": 128,
"watchers": 705,
"score": 0,
"subscribers_count": 9

View file

@ -13,10 +13,10 @@
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2023-11-26T05:16:40Z",
"updated_at": "2023-11-26T11:06:51Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 113,
"watchers": 116,
"score": 0,
"subscribers_count": 2
},

View file

@ -349,10 +349,10 @@
"description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).",
"fork": false,
"created_at": "2023-11-24T18:26:36Z",
"updated_at": "2023-11-25T12:56:11Z",
"updated_at": "2023-11-26T06:49:06Z",
"pushed_at": "2023-11-24T20:19:44Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -361,7 +361,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 24,
"watchers": 23,
"score": 0,
"subscribers_count": 1
}

View file

@ -257,10 +257,10 @@
"description": "Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.",
"fork": false,
"created_at": "2023-10-17T07:44:16Z",
"updated_at": "2023-11-25T15:28:13Z",
"updated_at": "2023-11-26T08:35:11Z",
"pushed_at": "2023-10-18T04:59:50Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -269,7 +269,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
"fork": false,
"created_at": "2023-10-24T17:19:32Z",
"updated_at": "2023-11-25T16:48:28Z",
"updated_at": "2023-11-26T08:13:25Z",
"pushed_at": "2023-10-26T14:16:05Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,32 +0,0 @@
[
{
"id": 723561577,
"name": "CVE-2023-5561",
"full_name": "justhx0r\/CVE-2023-5561",
"owner": {
"login": "justhx0r",
"id": 114948024,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114948024?v=4",
"html_url": "https:\/\/github.com\/justhx0r"
},
"html_url": "https:\/\/github.com\/justhx0r\/CVE-2023-5561",
"description": "CVE-2023-5561",
"fork": false,
"created_at": "2023-11-26T03:47:33Z",
"updated_at": "2023-11-26T03:47:59Z",
"pushed_at": "2023-11-26T03:49:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -928,13 +928,6 @@
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
### CVE-2023-5561 (2023-10-16)
<code>WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
</code>
- [justhx0r/CVE-2023-5561](https://github.com/justhx0r/CVE-2023-5561)
### CVE-2023-5965
- [pedrojosenavasperez/cve-2023-5965](https://github.com/pedrojosenavasperez/cve-2023-5965)
@ -36421,6 +36414,7 @@
<code>diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
</code>
- [hiikezoe/diaggetroot](https://github.com/hiikezoe/diaggetroot)
- [poliva/root-zte-open](https://github.com/poliva/root-zte-open)
### CVE-2012-4431 (2012-12-19)
@ -36493,6 +36487,13 @@
### CVE-2012-5664
- [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test)
### CVE-2012-5958 (2013-01-31)
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
</code>
- [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp)
### CVE-2012-5960 (2013-01-31)
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.