mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/11/22 06:33:25
This commit is contained in:
parent
8472c16504
commit
f21de923d0
43 changed files with 137 additions and 344 deletions
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 91797702,
|
||||
"name": "CVE-2011-1237",
|
||||
"full_name": "BrunoPujos\/CVE-2011-1237",
|
||||
"owner": {
|
||||
"login": "BrunoPujos",
|
||||
"id": 28804193,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28804193?v=4",
|
||||
"html_url": "https:\/\/github.com\/BrunoPujos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BrunoPujos\/CVE-2011-1237",
|
||||
"description": "POC for exploit of CVE-2011-1237",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-19T11:04:26Z",
|
||||
"updated_at": "2019-08-26T16:40:01Z",
|
||||
"pushed_at": "2017-05-19T11:06:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 143285880,
|
||||
"name": "CVE-2011-3192",
|
||||
"full_name": "limkokholefork\/CVE-2011-3192",
|
||||
"owner": {
|
||||
"login": "limkokholefork",
|
||||
"id": 82161820,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82161820?v=4",
|
||||
"html_url": "https:\/\/github.com\/limkokholefork"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/limkokholefork\/CVE-2011-3192",
|
||||
"description": "Apache Range Header DoS Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-02T11:30:35Z",
|
||||
"updated_at": "2022-09-23T13:15:15Z",
|
||||
"pushed_at": "2017-07-03T19:26:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 254247099,
|
||||
"name": "cve-2011-3192",
|
||||
|
|
|
@ -1,36 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 88668178,
|
||||
"name": "CVE-2011-3368",
|
||||
"full_name": "SECFORCE\/CVE-2011-3368",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2011-3368",
|
||||
"description": "CVE-2011-3368 exploit code",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-18T20:34:53Z",
|
||||
"updated_at": "2023-09-28T10:40:47Z",
|
||||
"pushed_at": "2017-04-18T20:36:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2011-3368"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 177220399,
|
||||
"name": "CVE-2011-3368",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 88757320,
|
||||
"name": "CVE-2011-4107",
|
||||
"full_name": "SECFORCE\/CVE-2011-4107",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2011-4107",
|
||||
"description": "phpMyAdmin 3.3.X and 3.4.X - Local File Inclusion",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-19T14:54:13Z",
|
||||
"updated_at": "2021-09-17T11:02:45Z",
|
||||
"pushed_at": "2017-04-19T14:55:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2023-11-21T00:09:14Z",
|
||||
"updated_at": "2023-11-22T05:49:40Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"stargazers_count": 778,
|
||||
"watchers_count": 778,
|
||||
"has_discussions": false,
|
||||
"forks_count": 434,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 434,
|
||||
"watchers": 777,
|
||||
"watchers": 778,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -173,13 +173,13 @@
|
|||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"forks": 61,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2023-11-14T14:06:30Z",
|
||||
"updated_at": "2023-11-22T00:35:30Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 497,
|
||||
"watchers_count": 497,
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"has_discussions": false,
|
||||
"forks_count": 469,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 469,
|
||||
"watchers": 497,
|
||||
"watchers": 496,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A PoC for CVE-2018-7249",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-21T20:31:09Z",
|
||||
"updated_at": "2022-12-06T00:53:07Z",
|
||||
"updated_at": "2023-11-22T00:54:34Z",
|
||||
"pushed_at": "2018-03-01T19:06:50Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -65,7 +65,7 @@
|
|||
"security-1266"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"forks": 93,
|
||||
"watchers": 301,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -59,39 +59,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 321044044,
|
||||
"name": "CVE-2020-17530",
|
||||
"full_name": "Al1ex\/CVE-2020-17530",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-17530",
|
||||
"description": "S2-061 CVE-2020-17530",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-13T11:02:15Z",
|
||||
"updated_at": "2023-09-28T11:22:57Z",
|
||||
"pushed_at": "2020-12-22T15:27:51Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-17530",
|
||||
"s2-061"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 321259848,
|
||||
"name": "CVE-2020-17530-strust2-061",
|
||||
|
|
|
@ -119,36 +119,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 320394850,
|
||||
"name": "git-lfs-RCE-exploit-CVE-2020-27955-revshell",
|
||||
"full_name": "williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell",
|
||||
"owner": {
|
||||
"login": "williamgoulois",
|
||||
"id": 37271970,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37271970?v=4",
|
||||
"html_url": "https:\/\/github.com\/williamgoulois"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-10T21:31:24Z",
|
||||
"updated_at": "2021-02-11T07:12:46Z",
|
||||
"pushed_at": "2020-12-10T22:03:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 322199299,
|
||||
"name": "CVE-2020-27955",
|
||||
|
|
|
@ -90,10 +90,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2023-11-07T05:38:43Z",
|
||||
"updated_at": "2023-11-22T05:42:14Z",
|
||||
"pushed_at": "2023-06-08T04:01:33Z",
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"has_discussions": false,
|
||||
"forks_count": 152,
|
||||
"allow_forking": true,
|
||||
|
@ -104,7 +104,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 152,
|
||||
"watchers": 460,
|
||||
"watchers": 461,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -347,10 +347,10 @@
|
|||
"description": "Laravel RCE (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T17:22:55Z",
|
||||
"updated_at": "2023-11-08T16:44:06Z",
|
||||
"updated_at": "2023-11-22T05:11:26Z",
|
||||
"pushed_at": "2023-11-20T21:46:43Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -368,7 +368,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -470,10 +470,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-11-15T14:00:10Z",
|
||||
"updated_at": "2023-11-22T06:01:40Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 898,
|
||||
"watchers_count": 898,
|
||||
"stargazers_count": 899,
|
||||
"watchers_count": 899,
|
||||
"has_discussions": false,
|
||||
"forks_count": 242,
|
||||
"allow_forking": true,
|
||||
|
@ -482,7 +482,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 242,
|
||||
"watchers": 898,
|
||||
"watchers": 899,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -142,10 +142,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2023-11-01T05:19:47Z",
|
||||
"updated_at": "2023-11-22T00:39:59Z",
|
||||
"pushed_at": "2022-11-16T13:14:56Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -154,7 +154,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-15T20:52:36Z",
|
||||
"updated_at": "2023-11-18T07:46:50Z",
|
||||
"pushed_at": "2023-11-20T09:46:10Z",
|
||||
"pushed_at": "2023-11-22T00:52:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -90,7 +90,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-21T02:34:32Z",
|
||||
"updated_at": "2023-11-21T02:36:09Z",
|
||||
"pushed_at": "2023-11-21T02:36:05Z",
|
||||
"pushed_at": "2023-11-22T02:02:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -103,6 +103,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -424,7 +424,7 @@
|
|||
"forks": 42,
|
||||
"watchers": 233,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 490307613,
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "cve-2022-33891-poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T16:16:51Z",
|
||||
"updated_at": "2023-11-05T07:13:43Z",
|
||||
"updated_at": "2023-11-22T01:53:54Z",
|
||||
"pushed_at": "2022-07-20T08:00:18Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"cve-2022-33891"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 51,
|
||||
"forks": 22,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T03:20:23Z",
|
||||
"updated_at": "2023-11-21T01:46:05Z",
|
||||
"updated_at": "2023-11-22T05:44:47Z",
|
||||
"pushed_at": "2023-09-17T10:05:02Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1064,7 +1064,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-02-19T19:49:41Z",
|
||||
"updated_at": "2023-03-26T07:35:15Z",
|
||||
"pushed_at": "2023-10-24T05:35:01Z",
|
||||
"pushed_at": "2023-11-22T05:11:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-10T02:34:01Z",
|
||||
"updated_at": "2023-07-11T01:38:50Z",
|
||||
"pushed_at": "2023-07-19T07:28:34Z",
|
||||
"pushed_at": "2023-11-22T01:10:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,12 +43,12 @@
|
|||
"description": "CVE-2023-1671-POC, based on dnslog platform",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-24T15:53:42Z",
|
||||
"updated_at": "2023-09-28T11:46:00Z",
|
||||
"updated_at": "2023-11-22T01:52:47Z",
|
||||
"pushed_at": "2023-04-26T02:40:41Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -56,8 +56,8 @@
|
|||
"cve-2023-1671"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 17,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": " CVE-2023-21823 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-20T11:26:48Z",
|
||||
"updated_at": "2023-09-14T21:06:27Z",
|
||||
"updated_at": "2023-11-22T01:40:58Z",
|
||||
"pushed_at": "2023-04-20T11:36:55Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T21:40:09Z",
|
||||
"updated_at": "2023-11-18T23:33:28Z",
|
||||
"updated_at": "2023-11-22T02:00:37Z",
|
||||
"pushed_at": "2023-10-17T22:04:13Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -122,14 +122,14 @@
|
|||
{
|
||||
"id": 672880378,
|
||||
"name": "CVE-2023-24488",
|
||||
"full_name": "LazyySec\/CVE-2023-24488",
|
||||
"full_name": "lazysec0x21\/CVE-2023-24488",
|
||||
"owner": {
|
||||
"login": "LazyySec",
|
||||
"login": "lazysec0x21",
|
||||
"id": 92903333,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
|
||||
"html_url": "https:\/\/github.com\/LazyySec"
|
||||
"html_url": "https:\/\/github.com\/lazysec0x21"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-24488",
|
||||
"html_url": "https:\/\/github.com\/lazysec0x21\/CVE-2023-24488",
|
||||
"description": "Tools to perform exploit CVE-2023-24488",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T11:29:16Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-16T23:41:27Z",
|
||||
"updated_at": "2023-11-21T18:07:55Z",
|
||||
"updated_at": "2023-11-22T04:20:20Z",
|
||||
"pushed_at": "2023-11-18T22:54:27Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 43,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "xortigate-cve-2023-27997",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T16:12:41Z",
|
||||
"updated_at": "2023-11-14T21:59:20Z",
|
||||
"updated_at": "2023-11-22T05:23:05Z",
|
||||
"pushed_at": "2023-10-12T16:17:23Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-04T07:48:13Z",
|
||||
"updated_at": "2023-11-20T14:47:56Z",
|
||||
"updated_at": "2023-11-22T05:12:34Z",
|
||||
"pushed_at": "2023-09-04T07:51:58Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 113,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-11-17T00:57:45Z",
|
||||
"updated_at": "2023-11-22T04:08:14Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 431,
|
||||
"watchers": 432,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
}
|
||||
|
|
|
@ -62,14 +62,14 @@
|
|||
{
|
||||
"id": 672719149,
|
||||
"name": "CVE-2023-35078",
|
||||
"full_name": "LazyySec\/CVE-2023-35078",
|
||||
"full_name": "lazysec0x21\/CVE-2023-35078",
|
||||
"owner": {
|
||||
"login": "LazyySec",
|
||||
"login": "lazysec0x21",
|
||||
"id": 92903333,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
|
||||
"html_url": "https:\/\/github.com\/LazyySec"
|
||||
"html_url": "https:\/\/github.com\/lazysec0x21"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-35078",
|
||||
"html_url": "https:\/\/github.com\/lazysec0x21\/CVE-2023-35078",
|
||||
"description": "Tools to scanner & exploit cve-2023-35078",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T02:24:24Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-21T01:53:10Z",
|
||||
"updated_at": "2023-11-21T21:49:40Z",
|
||||
"updated_at": "2023-11-22T00:49:27Z",
|
||||
"pushed_at": "2023-07-25T22:16:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -28,9 +28,9 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 676698139,
|
||||
|
|
|
@ -188,14 +188,14 @@
|
|||
{
|
||||
"id": 672759334,
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "LazyySec\/CVE-2023-38646",
|
||||
"full_name": "lazysec0x21\/CVE-2023-38646",
|
||||
"owner": {
|
||||
"login": "LazyySec",
|
||||
"login": "lazysec0x21",
|
||||
"id": 92903333,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
|
||||
"html_url": "https:\/\/github.com\/LazyySec"
|
||||
"html_url": "https:\/\/github.com\/lazysec0x21"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-38646",
|
||||
"html_url": "https:\/\/github.com\/lazysec0x21\/CVE-2023-38646",
|
||||
"description": "Tools to exploit metabase CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T05:25:37Z",
|
||||
|
|
|
@ -174,10 +174,10 @@
|
|||
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T04:56:10Z",
|
||||
"updated_at": "2023-11-20T23:49:43Z",
|
||||
"updated_at": "2023-11-22T02:13:46Z",
|
||||
"pushed_at": "2023-08-28T20:41:57Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -186,7 +186,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T09:35:07Z",
|
||||
"updated_at": "2023-11-20T07:55:58Z",
|
||||
"updated_at": "2023-11-22T02:15:40Z",
|
||||
"pushed_at": "2023-10-15T01:28:07Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 70,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-42793",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-29T06:43:35Z",
|
||||
"updated_at": "2023-11-13T10:30:47Z",
|
||||
"updated_at": "2023-11-22T04:21:54Z",
|
||||
"pushed_at": "2023-09-29T06:52:00Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T10:32:31Z",
|
||||
"updated_at": "2023-11-21T14:40:02Z",
|
||||
"updated_at": "2023-11-22T06:19:55Z",
|
||||
"pushed_at": "2023-11-21T10:45:58Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 53,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -48,16 +48,16 @@
|
|||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 18,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 721463764,
|
||||
|
@ -87,6 +87,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,12 +43,12 @@
|
|||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2023-11-20T03:22:50Z",
|
||||
"updated_at": "2023-11-22T01:49:29Z",
|
||||
"pushed_at": "2023-11-10T02:12:38Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -60,8 +60,8 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 113,
|
||||
"forks": 29,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T07:03:06Z",
|
||||
"updated_at": "2023-11-21T20:21:26Z",
|
||||
"updated_at": "2023-11-22T01:46:47Z",
|
||||
"pushed_at": "2023-11-17T07:19:11Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"sysaid"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"forks": 9,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-15T14:53:03Z",
|
||||
"updated_at": "2023-11-21T12:41:54Z",
|
||||
"updated_at": "2023-11-22T04:39:32Z",
|
||||
"pushed_at": "2023-11-15T14:53:48Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
24
README.md
24
README.md
|
@ -1672,7 +1672,7 @@
|
|||
- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
|
||||
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
|
||||
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
|
||||
- [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
|
||||
- [lazysec0x21/CVE-2023-24488](https://github.com/lazysec0x21/CVE-2023-24488)
|
||||
|
||||
### CVE-2023-24489 (2023-07-10)
|
||||
|
||||
|
@ -3445,7 +3445,7 @@
|
|||
|
||||
- [vchan-in/CVE-2023-35078-Exploit-POC](https://github.com/vchan-in/CVE-2023-35078-Exploit-POC)
|
||||
- [lager1/CVE-2023-35078](https://github.com/lager1/CVE-2023-35078)
|
||||
- [LazyySec/CVE-2023-35078](https://github.com/LazyySec/CVE-2023-35078)
|
||||
- [lazysec0x21/CVE-2023-35078](https://github.com/lazysec0x21/CVE-2023-35078)
|
||||
- [synfinner/CVE-2023-35078](https://github.com/synfinner/CVE-2023-35078)
|
||||
- [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit)
|
||||
- [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078)
|
||||
|
@ -4031,7 +4031,7 @@
|
|||
- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646)
|
||||
- [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc)
|
||||
- [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646)
|
||||
- [LazyySec/CVE-2023-38646](https://github.com/LazyySec/CVE-2023-38646)
|
||||
- [lazysec0x21/CVE-2023-38646](https://github.com/lazysec0x21/CVE-2023-38646)
|
||||
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
|
||||
- [shamo0/CVE-2023-38646-PoC](https://github.com/shamo0/CVE-2023-38646-PoC)
|
||||
- [fidjiw/CVE-2023-38646-POC](https://github.com/fidjiw/CVE-2023-38646-POC)
|
||||
|
@ -21958,7 +21958,6 @@
|
|||
|
||||
- [ka1n4t/CVE-2020-17530](https://github.com/ka1n4t/CVE-2020-17530)
|
||||
- [wuzuowei/CVE-2020-17530](https://github.com/wuzuowei/CVE-2020-17530)
|
||||
- [Al1ex/CVE-2020-17530](https://github.com/Al1ex/CVE-2020-17530)
|
||||
- [fengziHK/CVE-2020-17530-strust2-061](https://github.com/fengziHK/CVE-2020-17530-strust2-061)
|
||||
- [ludy-dev/freemarker_RCE_struts2_s2-061](https://github.com/ludy-dev/freemarker_RCE_struts2_s2-061)
|
||||
- [CyborgSecurity/CVE-2020-17530](https://github.com/CyborgSecurity/CVE-2020-17530)
|
||||
|
@ -22772,7 +22771,6 @@
|
|||
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go)
|
||||
- [yhsung/cve-2020-27955-poc](https://github.com/yhsung/cve-2020-27955-poc)
|
||||
- [r00t4dm/CVE-2020-27955](https://github.com/r00t4dm/CVE-2020-27955)
|
||||
- [williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell](https://github.com/williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell)
|
||||
- [shubham0d/CVE-2020-27955](https://github.com/shubham0d/CVE-2020-27955)
|
||||
- [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955)
|
||||
- [NeoDarwin/CVE-2020-27955](https://github.com/NeoDarwin/CVE-2020-27955)
|
||||
|
@ -36424,13 +36422,6 @@
|
|||
|
||||
- [jan0/isslfix](https://github.com/jan0/isslfix)
|
||||
|
||||
### CVE-2011-1237 (2011-04-13)
|
||||
|
||||
<code>Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
|
||||
</code>
|
||||
|
||||
- [BrunoPujos/CVE-2011-1237](https://github.com/BrunoPujos/CVE-2011-1237)
|
||||
|
||||
### CVE-2011-1249 (2011-06-16)
|
||||
|
||||
<code>The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
|
||||
|
@ -36535,7 +36526,6 @@
|
|||
</code>
|
||||
|
||||
- [tkisason/KillApachePy](https://github.com/tkisason/KillApachePy)
|
||||
- [limkokholefork/CVE-2011-3192](https://github.com/limkokholefork/CVE-2011-3192)
|
||||
- [stcmjp/cve-2011-3192](https://github.com/stcmjp/cve-2011-3192)
|
||||
- [futurezayka/CVE-2011-3192](https://github.com/futurezayka/CVE-2011-3192)
|
||||
|
||||
|
@ -36544,7 +36534,6 @@
|
|||
<code>The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
|
||||
</code>
|
||||
|
||||
- [SECFORCE/CVE-2011-3368](https://github.com/SECFORCE/CVE-2011-3368)
|
||||
- [colorblindpentester/CVE-2011-3368](https://github.com/colorblindpentester/CVE-2011-3368)
|
||||
|
||||
### CVE-2011-3389 (2011-09-06)
|
||||
|
@ -36568,13 +36557,6 @@
|
|||
|
||||
- [puppetlabs-toy-chest/puppetlabs-cve20113872](https://github.com/puppetlabs-toy-chest/puppetlabs-cve20113872)
|
||||
|
||||
### CVE-2011-4107 (2011-11-17)
|
||||
|
||||
<code>The simplexml_load_string function in the XML import plug-in (libraries/import/xml.php) in phpMyAdmin 3.4.x before 3.4.7.1 and 3.3.x before 3.3.10.5 allows remote authenticated users to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
|
||||
</code>
|
||||
|
||||
- [SECFORCE/CVE-2011-4107](https://github.com/SECFORCE/CVE-2011-4107)
|
||||
|
||||
### CVE-2011-4862 (2011-12-24)
|
||||
|
||||
<code>Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
|
||||
|
|
Loading…
Add table
Reference in a new issue