Auto Update 2023/11/22 06:33:25

This commit is contained in:
motikan2010-bot 2023-11-22 15:33:25 +09:00
parent 8472c16504
commit f21de923d0
43 changed files with 137 additions and 344 deletions

View file

@ -18,7 +18,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2

View file

@ -1,32 +0,0 @@
[
{
"id": 91797702,
"name": "CVE-2011-1237",
"full_name": "BrunoPujos\/CVE-2011-1237",
"owner": {
"login": "BrunoPujos",
"id": 28804193,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28804193?v=4",
"html_url": "https:\/\/github.com\/BrunoPujos"
},
"html_url": "https:\/\/github.com\/BrunoPujos\/CVE-2011-1237",
"description": "POC for exploit of CVE-2011-1237",
"fork": false,
"created_at": "2017-05-19T11:04:26Z",
"updated_at": "2019-08-26T16:40:01Z",
"pushed_at": "2017-05-19T11:06:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 143285880,
"name": "CVE-2011-3192",
"full_name": "limkokholefork\/CVE-2011-3192",
"owner": {
"login": "limkokholefork",
"id": 82161820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82161820?v=4",
"html_url": "https:\/\/github.com\/limkokholefork"
},
"html_url": "https:\/\/github.com\/limkokholefork\/CVE-2011-3192",
"description": "Apache Range Header DoS Exploit",
"fork": false,
"created_at": "2018-08-02T11:30:35Z",
"updated_at": "2022-09-23T13:15:15Z",
"pushed_at": "2017-07-03T19:26:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 254247099,
"name": "cve-2011-3192",

View file

@ -1,36 +1,4 @@
[
{
"id": 88668178,
"name": "CVE-2011-3368",
"full_name": "SECFORCE\/CVE-2011-3368",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2011-3368",
"description": "CVE-2011-3368 exploit code",
"fork": false,
"created_at": "2017-04-18T20:34:53Z",
"updated_at": "2023-09-28T10:40:47Z",
"pushed_at": "2017-04-18T20:36:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2011-3368"
],
"visibility": "public",
"forks": 14,
"watchers": 2,
"score": 0,
"subscribers_count": 4
},
{
"id": 177220399,
"name": "CVE-2011-3368",

View file

@ -1,32 +0,0 @@
[
{
"id": 88757320,
"name": "CVE-2011-4107",
"full_name": "SECFORCE\/CVE-2011-4107",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2011-4107",
"description": "phpMyAdmin 3.3.X and 3.4.X - Local File Inclusion",
"fork": false,
"created_at": "2017-04-19T14:54:13Z",
"updated_at": "2021-09-17T11:02:45Z",
"pushed_at": "2017-04-19T14:55:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-11-21T00:09:14Z",
"updated_at": "2023-11-22T05:49:40Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 777,
"watchers_count": 777,
"stargazers_count": 778,
"watchers_count": 778,
"has_discussions": false,
"forks_count": 434,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 434,
"watchers": 777,
"watchers": 778,
"score": 0,
"subscribers_count": 11
},

View file

@ -173,13 +173,13 @@
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 60,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 60,
"forks": 61,
"watchers": 100,
"score": 0,
"subscribers_count": 7

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2023-11-14T14:06:30Z",
"updated_at": "2023-11-22T00:35:30Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 497,
"watchers_count": 497,
"stargazers_count": 496,
"watchers_count": 496,
"has_discussions": false,
"forks_count": 469,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 469,
"watchers": 497,
"watchers": 496,
"score": 0,
"subscribers_count": 58
},

View file

@ -13,10 +13,10 @@
"description": "A PoC for CVE-2018-7249",
"fork": false,
"created_at": "2018-02-21T20:31:09Z",
"updated_at": "2022-12-06T00:53:07Z",
"updated_at": "2023-11-22T00:54:34Z",
"pushed_at": "2018-03-01T19:06:50Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 2
}

View file

@ -48,7 +48,7 @@
"stargazers_count": 301,
"watchers_count": 301,
"has_discussions": false,
"forks_count": 92,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -65,7 +65,7 @@
"security-1266"
],
"visibility": "public",
"forks": 92,
"forks": 93,
"watchers": 301,
"score": 0,
"subscribers_count": 4

View file

@ -59,39 +59,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 321044044,
"name": "CVE-2020-17530",
"full_name": "Al1ex\/CVE-2020-17530",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-17530",
"description": "S2-061 CVE-2020-17530",
"fork": false,
"created_at": "2020-12-13T11:02:15Z",
"updated_at": "2023-09-28T11:22:57Z",
"pushed_at": "2020-12-22T15:27:51Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-17530",
"s2-061"
],
"visibility": "public",
"forks": 10,
"watchers": 30,
"score": 0,
"subscribers_count": 2
},
{
"id": 321259848,
"name": "CVE-2020-17530-strust2-061",

View file

@ -119,36 +119,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 320394850,
"name": "git-lfs-RCE-exploit-CVE-2020-27955-revshell",
"full_name": "williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell",
"owner": {
"login": "williamgoulois",
"id": 37271970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37271970?v=4",
"html_url": "https:\/\/github.com\/williamgoulois"
},
"html_url": "https:\/\/github.com\/williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell",
"description": null,
"fork": false,
"created_at": "2020-12-10T21:31:24Z",
"updated_at": "2021-02-11T07:12:46Z",
"pushed_at": "2020-12-10T22:03:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 322199299,
"name": "CVE-2020-27955",

View file

@ -90,10 +90,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2023-11-07T05:38:43Z",
"updated_at": "2023-11-22T05:42:14Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 152,
"allow_forking": true,
@ -104,7 +104,7 @@
],
"visibility": "public",
"forks": 152,
"watchers": 460,
"watchers": 461,
"score": 0,
"subscribers_count": 8
},

View file

@ -347,10 +347,10 @@
"description": "Laravel RCE (CVE-2021-3129)",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2023-11-08T16:44:06Z",
"updated_at": "2023-11-22T05:11:26Z",
"pushed_at": "2023-11-20T21:46:43Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -368,7 +368,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 1
},

View file

@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-11-15T14:00:10Z",
"updated_at": "2023-11-22T06:01:40Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 898,
"watchers_count": 898,
"stargazers_count": 899,
"watchers_count": 899,
"has_discussions": false,
"forks_count": 242,
"allow_forking": true,
@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 242,
"watchers": 898,
"watchers": 899,
"score": 0,
"subscribers_count": 27
},

View file

@ -142,10 +142,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2023-11-01T05:19:47Z",
"updated_at": "2023-11-22T00:39:59Z",
"pushed_at": "2022-11-16T13:14:56Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-11-15T20:52:36Z",
"updated_at": "2023-11-18T07:46:50Z",
"pushed_at": "2023-11-20T09:46:10Z",
"pushed_at": "2023-11-22T00:52:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -90,7 +90,7 @@
"fork": false,
"created_at": "2023-11-21T02:34:32Z",
"updated_at": "2023-11-21T02:36:09Z",
"pushed_at": "2023-11-21T02:36:05Z",
"pushed_at": "2023-11-22T02:02:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -103,6 +103,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -424,7 +424,7 @@
"forks": 42,
"watchers": 233,
"score": 0,
"subscribers_count": 7
"subscribers_count": 6
},
{
"id": 490307613,

View file

@ -13,12 +13,12 @@
"description": "cve-2022-33891-poc",
"fork": false,
"created_at": "2022-07-18T16:16:51Z",
"updated_at": "2023-11-05T07:13:43Z",
"updated_at": "2023-11-22T01:53:54Z",
"pushed_at": "2022-07-20T08:00:18Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 20,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,8 +26,8 @@
"cve-2022-33891"
],
"visibility": "public",
"forks": 20,
"watchers": 51,
"forks": 22,
"watchers": 52,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2023-09-17T03:20:23Z",
"updated_at": "2023-11-21T01:46:05Z",
"updated_at": "2023-11-22T05:44:47Z",
"pushed_at": "2023-09-17T10:05:02Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -1064,7 +1064,7 @@
"fork": false,
"created_at": "2023-02-19T19:49:41Z",
"updated_at": "2023-03-26T07:35:15Z",
"pushed_at": "2023-10-24T05:35:01Z",
"pushed_at": "2023-11-22T05:11:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-07-10T02:34:01Z",
"updated_at": "2023-07-11T01:38:50Z",
"pushed_at": "2023-07-19T07:28:34Z",
"pushed_at": "2023-11-22T01:10:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,12 +43,12 @@
"description": "CVE-2023-1671-POC, based on dnslog platform",
"fork": false,
"created_at": "2023-04-24T15:53:42Z",
"updated_at": "2023-09-28T11:46:00Z",
"updated_at": "2023-11-22T01:52:47Z",
"pushed_at": "2023-04-26T02:40:41Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -56,8 +56,8 @@
"cve-2023-1671"
],
"visibility": "public",
"forks": 2,
"watchers": 17,
"forks": 4,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": " CVE-2023-21823 PoC",
"fork": false,
"created_at": "2023-04-20T11:26:48Z",
"updated_at": "2023-09-14T21:06:27Z",
"updated_at": "2023-11-22T01:40:58Z",
"pushed_at": "2023-04-20T11:36:55Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2023-11-18T23:33:28Z",
"updated_at": "2023-11-22T02:00:37Z",
"pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 2
},

View file

@ -122,14 +122,14 @@
{
"id": 672880378,
"name": "CVE-2023-24488",
"full_name": "LazyySec\/CVE-2023-24488",
"full_name": "lazysec0x21\/CVE-2023-24488",
"owner": {
"login": "LazyySec",
"login": "lazysec0x21",
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
"html_url": "https:\/\/github.com\/LazyySec"
"html_url": "https:\/\/github.com\/lazysec0x21"
},
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-24488",
"html_url": "https:\/\/github.com\/lazysec0x21\/CVE-2023-24488",
"description": "Tools to perform exploit CVE-2023-24488",
"fork": false,
"created_at": "2023-07-31T11:29:16Z",

View file

@ -13,10 +13,10 @@
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2023-11-21T18:07:55Z",
"updated_at": "2023-11-22T04:20:20Z",
"pushed_at": "2023-11-18T22:54:27Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 43,
"watchers": 46,
"score": 0,
"subscribers_count": 4
}

View file

@ -223,10 +223,10 @@
"description": "xortigate-cve-2023-27997",
"fork": false,
"created_at": "2023-10-12T16:12:41Z",
"updated_at": "2023-11-14T21:59:20Z",
"updated_at": "2023-11-22T05:23:05Z",
"pushed_at": "2023-10-12T16:17:23Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-04T07:48:13Z",
"updated_at": "2023-11-20T14:47:56Z",
"updated_at": "2023-11-22T05:12:34Z",
"pushed_at": "2023-09-04T07:51:58Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 113,
"watchers": 115,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-11-17T00:57:45Z",
"updated_at": "2023-11-22T04:08:14Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 431,
"watchers_count": 431,
"stargazers_count": 432,
"watchers_count": 432,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 431,
"watchers": 432,
"score": 0,
"subscribers_count": 14
}

View file

@ -62,14 +62,14 @@
{
"id": 672719149,
"name": "CVE-2023-35078",
"full_name": "LazyySec\/CVE-2023-35078",
"full_name": "lazysec0x21\/CVE-2023-35078",
"owner": {
"login": "LazyySec",
"login": "lazysec0x21",
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
"html_url": "https:\/\/github.com\/LazyySec"
"html_url": "https:\/\/github.com\/lazysec0x21"
},
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-35078",
"html_url": "https:\/\/github.com\/lazysec0x21\/CVE-2023-35078",
"description": "Tools to scanner & exploit cve-2023-35078",
"fork": false,
"created_at": "2023-07-31T02:24:24Z",

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2023-07-21T01:53:10Z",
"updated_at": "2023-11-21T21:49:40Z",
"updated_at": "2023-11-22T00:49:27Z",
"pushed_at": "2023-07-25T22:16:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -28,9 +28,9 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 4
"subscribers_count": 1
},
{
"id": 676698139,

View file

@ -188,14 +188,14 @@
{
"id": 672759334,
"name": "CVE-2023-38646",
"full_name": "LazyySec\/CVE-2023-38646",
"full_name": "lazysec0x21\/CVE-2023-38646",
"owner": {
"login": "LazyySec",
"login": "lazysec0x21",
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
"html_url": "https:\/\/github.com\/LazyySec"
"html_url": "https:\/\/github.com\/lazysec0x21"
},
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-38646",
"html_url": "https:\/\/github.com\/lazysec0x21\/CVE-2023-38646",
"description": "Tools to exploit metabase CVE-2023-38646",
"fork": false,
"created_at": "2023-07-31T05:25:37Z",

View file

@ -174,10 +174,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2023-11-20T23:49:43Z",
"updated_at": "2023-11-22T02:13:46Z",
"pushed_at": "2023-08-28T20:41:57Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -186,7 +186,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 0
},

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2023-11-20T07:55:58Z",
"updated_at": "2023-11-22T02:15:40Z",
"pushed_at": "2023-10-15T01:28:07Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 70,
"watchers": 72,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-42793",
"fork": false,
"created_at": "2023-09-29T06:43:35Z",
"updated_at": "2023-11-13T10:30:47Z",
"updated_at": "2023-11-22T04:21:54Z",
"pushed_at": "2023-09-29T06:52:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2023-11-21T14:40:02Z",
"updated_at": "2023-11-22T06:19:55Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 53,
"watchers": 55,
"score": 0,
"subscribers_count": 1
},
@ -48,16 +48,16 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 15,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 18,
"watchers": 22,
"score": 0,
"subscribers_count": 1
"subscribers_count": 3
},
{
"id": 721463764,
@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,12 +43,12 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2023-11-20T03:22:50Z",
"updated_at": "2023-11-22T01:49:29Z",
"pushed_at": "2023-11-10T02:12:38Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 27,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,8 +60,8 @@
"redteam"
],
"visibility": "public",
"forks": 27,
"watchers": 113,
"forks": 29,
"watchers": 114,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,12 +13,12 @@
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
"fork": false,
"created_at": "2023-11-17T07:03:06Z",
"updated_at": "2023-11-21T20:21:26Z",
"updated_at": "2023-11-22T01:46:47Z",
"pushed_at": "2023-11-17T07:19:11Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"sysaid"
],
"visibility": "public",
"forks": 7,
"watchers": 31,
"forks": 9,
"watchers": 32,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
"fork": false,
"created_at": "2023-11-15T14:53:03Z",
"updated_at": "2023-11-21T12:41:54Z",
"updated_at": "2023-11-22T04:39:32Z",
"pushed_at": "2023-11-15T14:53:48Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 19,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -1672,7 +1672,7 @@
- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
- [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
- [lazysec0x21/CVE-2023-24488](https://github.com/lazysec0x21/CVE-2023-24488)
### CVE-2023-24489 (2023-07-10)
@ -3445,7 +3445,7 @@
- [vchan-in/CVE-2023-35078-Exploit-POC](https://github.com/vchan-in/CVE-2023-35078-Exploit-POC)
- [lager1/CVE-2023-35078](https://github.com/lager1/CVE-2023-35078)
- [LazyySec/CVE-2023-35078](https://github.com/LazyySec/CVE-2023-35078)
- [lazysec0x21/CVE-2023-35078](https://github.com/lazysec0x21/CVE-2023-35078)
- [synfinner/CVE-2023-35078](https://github.com/synfinner/CVE-2023-35078)
- [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit)
- [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078)
@ -4031,7 +4031,7 @@
- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646)
- [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc)
- [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646)
- [LazyySec/CVE-2023-38646](https://github.com/LazyySec/CVE-2023-38646)
- [lazysec0x21/CVE-2023-38646](https://github.com/lazysec0x21/CVE-2023-38646)
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
- [shamo0/CVE-2023-38646-PoC](https://github.com/shamo0/CVE-2023-38646-PoC)
- [fidjiw/CVE-2023-38646-POC](https://github.com/fidjiw/CVE-2023-38646-POC)
@ -21958,7 +21958,6 @@
- [ka1n4t/CVE-2020-17530](https://github.com/ka1n4t/CVE-2020-17530)
- [wuzuowei/CVE-2020-17530](https://github.com/wuzuowei/CVE-2020-17530)
- [Al1ex/CVE-2020-17530](https://github.com/Al1ex/CVE-2020-17530)
- [fengziHK/CVE-2020-17530-strust2-061](https://github.com/fengziHK/CVE-2020-17530-strust2-061)
- [ludy-dev/freemarker_RCE_struts2_s2-061](https://github.com/ludy-dev/freemarker_RCE_struts2_s2-061)
- [CyborgSecurity/CVE-2020-17530](https://github.com/CyborgSecurity/CVE-2020-17530)
@ -22772,7 +22771,6 @@
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go)
- [yhsung/cve-2020-27955-poc](https://github.com/yhsung/cve-2020-27955-poc)
- [r00t4dm/CVE-2020-27955](https://github.com/r00t4dm/CVE-2020-27955)
- [williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell](https://github.com/williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell)
- [shubham0d/CVE-2020-27955](https://github.com/shubham0d/CVE-2020-27955)
- [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955)
- [NeoDarwin/CVE-2020-27955](https://github.com/NeoDarwin/CVE-2020-27955)
@ -36424,13 +36422,6 @@
- [jan0/isslfix](https://github.com/jan0/isslfix)
### CVE-2011-1237 (2011-04-13)
<code>Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other &quot;Vulnerability Type 1&quot; CVEs listed in MS11-034, aka &quot;Win32k Use After Free Vulnerability.&quot;
</code>
- [BrunoPujos/CVE-2011-1237](https://github.com/BrunoPujos/CVE-2011-1237)
### CVE-2011-1249 (2011-06-16)
<code>The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka &quot;Ancillary Function Driver Elevation of Privilege Vulnerability.&quot;
@ -36535,7 +36526,6 @@
</code>
- [tkisason/KillApachePy](https://github.com/tkisason/KillApachePy)
- [limkokholefork/CVE-2011-3192](https://github.com/limkokholefork/CVE-2011-3192)
- [stcmjp/cve-2011-3192](https://github.com/stcmjp/cve-2011-3192)
- [futurezayka/CVE-2011-3192](https://github.com/futurezayka/CVE-2011-3192)
@ -36544,7 +36534,6 @@
<code>The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
</code>
- [SECFORCE/CVE-2011-3368](https://github.com/SECFORCE/CVE-2011-3368)
- [colorblindpentester/CVE-2011-3368](https://github.com/colorblindpentester/CVE-2011-3368)
### CVE-2011-3389 (2011-09-06)
@ -36568,13 +36557,6 @@
- [puppetlabs-toy-chest/puppetlabs-cve20113872](https://github.com/puppetlabs-toy-chest/puppetlabs-cve20113872)
### CVE-2011-4107 (2011-11-17)
<code>The simplexml_load_string function in the XML import plug-in (libraries/import/xml.php) in phpMyAdmin 3.4.x before 3.4.7.1 and 3.3.x before 3.3.10.5 allows remote authenticated users to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
</code>
- [SECFORCE/CVE-2011-4107](https://github.com/SECFORCE/CVE-2011-4107)
### CVE-2011-4862 (2011-12-24)
<code>Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.