mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/07/31 14:32:33
This commit is contained in:
parent
466b33fb8f
commit
f6ad226b5b
78 changed files with 1313 additions and 418 deletions
|
@ -1038,10 +1038,10 @@
|
|||
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-08T19:54:33Z",
|
||||
"updated_at": "2023-07-22T13:10:57Z",
|
||||
"updated_at": "2023-07-31T11:17:20Z",
|
||||
"pushed_at": "2021-02-20T19:41:03Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -1050,7 +1050,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -2081,7 +2081,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-01T03:50:02Z",
|
||||
"updated_at": "2023-07-08T05:28:31Z",
|
||||
"pushed_at": "2023-07-08T05:29:30Z",
|
||||
"pushed_at": "2023-07-31T12:27:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -62,14 +62,14 @@
|
|||
{
|
||||
"id": 517399645,
|
||||
"name": "SHELL-SCHOCK",
|
||||
"full_name": "prince-stark\/SHELL-SCHOCK",
|
||||
"full_name": "Gobinath-B\/SHELL-SCHOCK",
|
||||
"owner": {
|
||||
"login": "prince-stark",
|
||||
"login": "Gobinath-B",
|
||||
"id": 81898167,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81898167?v=4",
|
||||
"html_url": "https:\/\/github.com\/prince-stark"
|
||||
"html_url": "https:\/\/github.com\/Gobinath-B"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/prince-stark\/SHELL-SCHOCK",
|
||||
"html_url": "https:\/\/github.com\/Gobinath-B\/SHELL-SCHOCK",
|
||||
"description": "CVE-2014-7169 Shell Shock",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-24T18:03:30Z",
|
||||
|
|
|
@ -327,10 +327,10 @@
|
|||
"description": "Scan vuls kernel CVE-2016-5195 - DirtyCow",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-29T08:45:45Z",
|
||||
"updated_at": "2023-06-26T12:35:37Z",
|
||||
"updated_at": "2023-07-31T12:26:18Z",
|
||||
"pushed_at": "2016-10-29T08:50:34Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -339,7 +339,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2017/CVE-2017-0564.json
Normal file
32
2017/CVE-2017-0564.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 117041381,
|
||||
"name": "CVE-2017-0564-ION-PoC",
|
||||
"full_name": "guoygang\/CVE-2017-0564-ION-PoC",
|
||||
"owner": {
|
||||
"login": "guoygang",
|
||||
"id": 16954452,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16954452?v=4",
|
||||
"html_url": "https:\/\/github.com\/guoygang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guoygang\/CVE-2017-0564-ION-PoC",
|
||||
"description": "ION通用提权漏洞PoC以及分析",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T02:50:26Z",
|
||||
"updated_at": "2022-05-26T08:30:12Z",
|
||||
"pushed_at": "2018-01-11T02:53:43Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -154,6 +154,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 116589306,
|
||||
"name": "diff",
|
||||
"full_name": "sigbitsadmin\/diff",
|
||||
"owner": {
|
||||
"login": "sigbitsadmin",
|
||||
"id": 33204560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204560?v=4",
|
||||
"html_url": "https:\/\/github.com\/sigbitsadmin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sigbitsadmin\/diff",
|
||||
"description": "Simply diff for CVE-2017-0785",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-07T18:30:42Z",
|
||||
"updated_at": "2018-01-07T18:31:03Z",
|
||||
"pushed_at": "2018-01-07T18:31:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 122293991,
|
||||
"name": "Bluetooth-Crash-CVE-2017-0785",
|
||||
|
|
36
2017/CVE-2017-0807.json
Normal file
36
2017/CVE-2017-0807.json
Normal file
|
@ -0,0 +1,36 @@
|
|||
[
|
||||
{
|
||||
"id": 117631583,
|
||||
"name": "PoC_CVE-2017-0807",
|
||||
"full_name": "kpatsakis\/PoC_CVE-2017-0807",
|
||||
"owner": {
|
||||
"login": "kpatsakis",
|
||||
"id": 9294190,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9294190?v=4",
|
||||
"html_url": "https:\/\/github.com\/kpatsakis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kpatsakis\/PoC_CVE-2017-0807",
|
||||
"description": "Proof of concept of CVE-2017-0807",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T04:34:06Z",
|
||||
"updated_at": "2018-11-26T05:17:02Z",
|
||||
"pushed_at": "2018-01-16T04:55:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"android",
|
||||
"cve-2017-0807",
|
||||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2017/CVE-2017-1000475.json
Normal file
32
2017/CVE-2017-1000475.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 118515767,
|
||||
"name": "CVE-2017-1000475",
|
||||
"full_name": "lajarajorge\/CVE-2017-1000475",
|
||||
"owner": {
|
||||
"login": "lajarajorge",
|
||||
"id": 35707370,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35707370?v=4",
|
||||
"html_url": "https:\/\/github.com\/lajarajorge"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lajarajorge\/CVE-2017-1000475",
|
||||
"description": "Unquoted Path Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-22T21:10:22Z",
|
||||
"updated_at": "2018-01-22T21:10:22Z",
|
||||
"pushed_at": "2018-01-22T21:34:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -149,6 +149,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 116099094,
|
||||
"name": "weblogic_wls_wsat_rce",
|
||||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||||
"owner": {
|
||||
"login": "cjjduck",
|
||||
"id": 23519154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
|
||||
"html_url": "https:\/\/github.com\/cjjduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-10-09T02:33:00Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116430643,
|
||||
"name": "CVE-2017-10271",
|
||||
|
@ -269,6 +299,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 118144871,
|
||||
"name": "Oracle-WebLogic-CVE-2017-10271",
|
||||
"full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
|
||||
"owner": {
|
||||
"login": "peterpeter228",
|
||||
"id": 22089258,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22089258?v=4",
|
||||
"html_url": "https:\/\/github.com\/peterpeter228"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
|
||||
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-19T15:50:08Z",
|
||||
"updated_at": "2021-11-27T15:58:13Z",
|
||||
"pushed_at": "2018-01-19T11:29:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 120571410,
|
||||
"name": "weblogic_honeypot",
|
||||
|
|
32
2017/CVE-2017-10797.json
Normal file
32
2017/CVE-2017-10797.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 119376202,
|
||||
"name": "CVE-2017-10797",
|
||||
"full_name": "n4xh4ck5\/CVE-2017-10797",
|
||||
"owner": {
|
||||
"login": "n4xh4ck5",
|
||||
"id": 26029224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26029224?v=4",
|
||||
"html_url": "https:\/\/github.com\/n4xh4ck5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n4xh4ck5\/CVE-2017-10797",
|
||||
"description": "CVE-2017-10797- User Enumeration in OwnCloud Server 8.1-10.0",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T11:53:14Z",
|
||||
"updated_at": "2020-03-26T17:06:19Z",
|
||||
"pushed_at": "2018-01-29T11:56:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -396,6 +396,96 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
{
|
||||
"id": 117234193,
|
||||
"name": "RTF_11882_0802",
|
||||
"full_name": "Ridter\/RTF_11882_0802",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
|
||||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2023-07-07T19:10:31Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 165,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 117637164,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "likescam\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T05:47:47Z",
|
||||
"updated_at": "2018-01-16T05:47:59Z",
|
||||
"pushed_at": "2018-01-16T05:47:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 117637270,
|
||||
"name": "CVE-2018-0802_CVE-2017-11882",
|
||||
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T05:49:01Z",
|
||||
"updated_at": "2023-06-12T17:45:56Z",
|
||||
"pushed_at": "2018-01-16T05:49:10Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 130633082,
|
||||
"name": "CVE-2017-11882-Possible-Remcos-Malspam",
|
||||
|
|
32
2017/CVE-2017-16997.json
Normal file
32
2017/CVE-2017-16997.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116118639,
|
||||
"name": "CVE-2017-16997-poc",
|
||||
"full_name": "Xiami2012\/CVE-2017-16997-poc",
|
||||
"owner": {
|
||||
"login": "Xiami2012",
|
||||
"id": 1927254,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xiami2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
|
||||
"description": "A proof-of-concept for CVE-2017-16997",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T09:31:55Z",
|
||||
"updated_at": "2018-01-03T09:33:01Z",
|
||||
"pushed_at": "2018-01-03T10:39:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
32
2017/CVE-2017-17692.json
Normal file
32
2017/CVE-2017-17692.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116205741,
|
||||
"name": "CVE-2017-17692",
|
||||
"full_name": "specloli\/CVE-2017-17692",
|
||||
"owner": {
|
||||
"login": "specloli",
|
||||
"id": 10647366,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
|
||||
"html_url": "https:\/\/github.com\/specloli"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T02:40:13Z",
|
||||
"updated_at": "2021-11-23T15:08:43Z",
|
||||
"pushed_at": "2018-01-02T13:58:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -163,12 +163,12 @@
|
|||
"description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T16:56:14Z",
|
||||
"updated_at": "2023-07-20T10:16:09Z",
|
||||
"updated_at": "2023-07-31T09:51:36Z",
|
||||
"pushed_at": "2017-03-12T15:43:27Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -183,8 +183,8 @@
|
|||
"struts2"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 15,
|
||||
"forks": 25,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -415,12 +415,12 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2023-07-25T14:13:14Z",
|
||||
"updated_at": "2023-07-31T09:51:29Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 413,
|
||||
"watchers_count": 413,
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"has_discussions": false,
|
||||
"forks_count": 150,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -432,8 +432,8 @@
|
|||
"struts-pwn"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 150,
|
||||
"watchers": 413,
|
||||
"forks": 151,
|
||||
"watchers": 414,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
@ -1385,6 +1385,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 119230111,
|
||||
"name": "apache-struts-v2-CVE-2017-5638",
|
||||
"full_name": "cafnet\/apache-struts-v2-CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "cafnet",
|
||||
"id": 12993208,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12993208?v=4",
|
||||
"html_url": "https:\/\/github.com\/cafnet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cafnet\/apache-struts-v2-CVE-2017-5638",
|
||||
"description": "Working POC for CVE 2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-28T05:17:04Z",
|
||||
"updated_at": "2018-01-28T05:55:11Z",
|
||||
"pushed_at": "2018-01-28T05:55:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 121659152,
|
||||
"name": "CVE-2017-5638",
|
||||
|
|
|
@ -1,4 +1,39 @@
|
|||
[
|
||||
{
|
||||
"id": 116768537,
|
||||
"name": "exploit-cve-2017-5715",
|
||||
"full_name": "opsxcq\/exploit-cve-2017-5715",
|
||||
"owner": {
|
||||
"login": "opsxcq",
|
||||
"id": 16995025,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
|
||||
"html_url": "https:\/\/github.com\/opsxcq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
|
||||
"description": "Spectre exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T05:06:12Z",
|
||||
"updated_at": "2023-03-10T11:59:44Z",
|
||||
"pushed_at": "2018-01-09T22:27:25Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"intelbug",
|
||||
"memory-leak",
|
||||
"spectre"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 117425769,
|
||||
"name": "meltdown-spectre-bios-list",
|
||||
|
@ -66,5 +101,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 117944815,
|
||||
"name": "retpoline-audit",
|
||||
"full_name": "dmo2118\/retpoline-audit",
|
||||
"owner": {
|
||||
"login": "dmo2118",
|
||||
"id": 11342823,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11342823?v=4",
|
||||
"html_url": "https:\/\/github.com\/dmo2118"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dmo2118\/retpoline-audit",
|
||||
"description": "A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715).",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-18T06:55:53Z",
|
||||
"updated_at": "2018-01-20T08:00:58Z",
|
||||
"pushed_at": "2018-02-01T07:40:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,4 +1,211 @@
|
|||
[
|
||||
{
|
||||
"id": 116195445,
|
||||
"name": "spectre-attack",
|
||||
"full_name": "Eugnis\/spectre-attack",
|
||||
"owner": {
|
||||
"login": "Eugnis",
|
||||
"id": 2463830,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2463830?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eugnis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eugnis\/spectre-attack",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2023-07-28T01:58:24Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 727,
|
||||
"watchers_count": 727,
|
||||
"has_discussions": false,
|
||||
"forks_count": 185,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"c",
|
||||
"example",
|
||||
"exploit",
|
||||
"security-vulnerability",
|
||||
"spectre"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 185,
|
||||
"watchers": 727,
|
||||
"score": 0,
|
||||
"subscribers_count": 41
|
||||
},
|
||||
{
|
||||
"id": 116268310,
|
||||
"name": "Spectre-PoC",
|
||||
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"owner": {
|
||||
"login": "EdwardOwusuAdjei",
|
||||
"id": 16462560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T14:20:13Z",
|
||||
"updated_at": "2020-03-29T03:06:24Z",
|
||||
"pushed_at": "2018-01-04T14:27:29Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 116347505,
|
||||
"name": "spectre-attack-example",
|
||||
"full_name": "poilynx\/spectre-attack-example",
|
||||
"owner": {
|
||||
"login": "poilynx",
|
||||
"id": 8926090,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
|
||||
"html_url": "https:\/\/github.com\/poilynx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
|
||||
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T05:51:34Z",
|
||||
"updated_at": "2021-02-24T01:25:15Z",
|
||||
"pushed_at": "2018-01-05T05:56:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116442461,
|
||||
"name": "spectre-attack-demo",
|
||||
"full_name": "pedrolucasoliva\/spectre-attack-demo",
|
||||
"owner": {
|
||||
"login": "pedrolucasoliva",
|
||||
"id": 10757421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4",
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T01:08:15Z",
|
||||
"updated_at": "2018-01-15T06:12:51Z",
|
||||
"pushed_at": "2018-01-06T01:09:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 116505944,
|
||||
"name": "spectreScope",
|
||||
"full_name": "ixtal23\/spectreScope",
|
||||
"owner": {
|
||||
"login": "ixtal23",
|
||||
"id": 11915559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11915559?v=4",
|
||||
"html_url": "https:\/\/github.com\/ixtal23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ixtal23\/spectreScope",
|
||||
"description": "The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715).",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T18:27:03Z",
|
||||
"updated_at": "2023-02-03T09:00:16Z",
|
||||
"pushed_at": "2018-01-21T22:48:08Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apple",
|
||||
"centos",
|
||||
"cmake",
|
||||
"cpp",
|
||||
"demo",
|
||||
"digitalocean",
|
||||
"exploit",
|
||||
"intelbug",
|
||||
"linux",
|
||||
"macos",
|
||||
"oracle",
|
||||
"proofofconcept",
|
||||
"redhat",
|
||||
"solaris",
|
||||
"sparc",
|
||||
"spectre",
|
||||
"spectrescope",
|
||||
"sunos",
|
||||
"vulnerability",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 116532057,
|
||||
"name": "cve-2017-5753",
|
||||
"full_name": "albertleecn\/cve-2017-5753",
|
||||
"owner": {
|
||||
"login": "albertleecn",
|
||||
"id": 4608961,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4608961?v=4",
|
||||
"html_url": "https:\/\/github.com\/albertleecn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/albertleecn\/cve-2017-5753",
|
||||
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-07T02:46:38Z",
|
||||
"updated_at": "2021-03-31T12:50:11Z",
|
||||
"pushed_at": "2018-01-06T13:06:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 263311084,
|
||||
"name": "Spectre-Vulnerability-CVE-2017-5753-",
|
||||
|
|
|
@ -119,6 +119,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
{
|
||||
"id": 116449314,
|
||||
"name": "Am-I-affected-by-Meltdown",
|
||||
"full_name": "speecyy\/Am-I-affected-by-Meltdown",
|
||||
"owner": {
|
||||
"login": "speecyy",
|
||||
"id": 35145287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4",
|
||||
"html_url": "https:\/\/github.com\/speecyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
|
||||
"description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T03:16:33Z",
|
||||
"updated_at": "2020-02-27T19:31:43Z",
|
||||
"pushed_at": "2018-01-06T03:17:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 118008705,
|
||||
"name": "Meltdown",
|
||||
|
@ -148,5 +178,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 119104266,
|
||||
"name": "meltdown-aws-scanner",
|
||||
"full_name": "jdmulloy\/meltdown-aws-scanner",
|
||||
"owner": {
|
||||
"login": "jdmulloy",
|
||||
"id": 3395292,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4",
|
||||
"html_url": "https:\/\/github.com\/jdmulloy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner",
|
||||
"description": "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-26T21:18:13Z",
|
||||
"updated_at": "2019-02-27T18:46:20Z",
|
||||
"pushed_at": "2018-01-26T21:25:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 117869057,
|
||||
"name": "CiscoSpectreTakeover",
|
||||
"full_name": "GarnetSunset\/CiscoSpectreTakeover",
|
||||
"owner": {
|
||||
"login": "GarnetSunset",
|
||||
"id": 13430434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13430434?v=4",
|
||||
"html_url": "https:\/\/github.com\/GarnetSunset"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GarnetSunset\/CiscoSpectreTakeover",
|
||||
"description": "A POC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into Spectre (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-17T17:26:14Z",
|
||||
"updated_at": "2022-09-20T07:16:36Z",
|
||||
"pushed_at": "2018-01-23T19:54:07Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 118516301,
|
||||
"name": "CiscoIOSSNMPToolkit",
|
||||
|
|
62
2017/CVE-2017-7184.json
Normal file
62
2017/CVE-2017-7184.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 118847628,
|
||||
"name": "cve-2017-7184",
|
||||
"full_name": "rockl\/cve-2017-7184",
|
||||
"owner": {
|
||||
"login": "rockl",
|
||||
"id": 2081161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2081161?v=4",
|
||||
"html_url": "https:\/\/github.com\/rockl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rockl\/cve-2017-7184",
|
||||
"description": " the job is not yet finished",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T01:55:47Z",
|
||||
"updated_at": "2018-01-25T01:55:47Z",
|
||||
"pushed_at": "2018-01-25T01:55:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 118849076,
|
||||
"name": "cve-2017-7184-bak",
|
||||
"full_name": "rockl\/cve-2017-7184-bak",
|
||||
"owner": {
|
||||
"login": "rockl",
|
||||
"id": 2081161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2081161?v=4",
|
||||
"html_url": "https:\/\/github.com\/rockl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rockl\/cve-2017-7184-bak",
|
||||
"description": "not yet fin",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T02:10:45Z",
|
||||
"updated_at": "2018-01-25T02:10:45Z",
|
||||
"pushed_at": "2018-01-25T02:10:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -334,6 +334,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 118708741,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "mirrorblack\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "mirrorblack",
|
||||
"id": 33338951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33338951?v=4",
|
||||
"html_url": "https:\/\/github.com\/mirrorblack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mirrorblack\/CVE-2017-7269",
|
||||
"description": "CVE-2017-7269利用代码(rb文件)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-24T03:51:58Z",
|
||||
"updated_at": "2018-01-24T03:51:58Z",
|
||||
"pushed_at": "2018-01-24T03:51:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 131371800,
|
||||
"name": "CVE-2017-7269",
|
||||
|
|
|
@ -29,6 +29,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 116858521,
|
||||
"name": "CVE-2017-8570",
|
||||
"full_name": "rxwx\/CVE-2017-8570",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/CVE-2017-8570",
|
||||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2023-06-27T20:52:06Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 182,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
{
|
||||
"id": 122914059,
|
||||
"name": "Office-CVE-2017-8570",
|
||||
|
|
32
2017/CVE-2017-8802.json
Normal file
32
2017/CVE-2017-8802.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 118624965,
|
||||
"name": "Zimbra-CVE-2017-8802-Hotifx",
|
||||
"full_name": "ozzi-\/Zimbra-CVE-2017-8802-Hotifx",
|
||||
"owner": {
|
||||
"login": "ozzi-",
|
||||
"id": 7944573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7944573?v=4",
|
||||
"html_url": "https:\/\/github.com\/ozzi-"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ozzi-\/Zimbra-CVE-2017-8802-Hotifx",
|
||||
"description": "Security hotfix for CVE-2017-8802 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-23T14:56:18Z",
|
||||
"updated_at": "2018-01-23T14:56:59Z",
|
||||
"pushed_at": "2018-01-23T14:58:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2023-07-09T08:49:43Z",
|
||||
"updated_at": "2023-07-31T08:41:39Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"stargazers_count": 487,
|
||||
"watchers_count": 487,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 486,
|
||||
"watchers": 487,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-23T14:53:19Z",
|
||||
"updated_at": "2023-05-05T15:40:36Z",
|
||||
"updated_at": "2023-07-31T12:40:27Z",
|
||||
"pushed_at": "2022-08-28T08:21:26Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2023-07-24T07:53:34Z",
|
||||
"updated_at": "2023-07-31T12:49:36Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 333,
|
||||
"watchers": 334,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-07-31T03:15:54Z",
|
||||
"updated_at": "2023-07-31T07:21:16Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3824,
|
||||
"watchers_count": 3824,
|
||||
"stargazers_count": 3825,
|
||||
"watchers_count": 3825,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3824,
|
||||
"watchers": 3825,
|
||||
"score": 0,
|
||||
"subscribers_count": 154
|
||||
},
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2023-07-28T12:49:46Z",
|
||||
"updated_at": "2023-07-31T08:12:38Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 182,
|
||||
"watchers": 183,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -343,10 +343,10 @@
|
|||
"description": "CVE-2019-2725 bypass pocscan and exp ",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-16T06:17:09Z",
|
||||
"updated_at": "2020-03-17T08:04:13Z",
|
||||
"updated_at": "2023-07-31T06:26:42Z",
|
||||
"pushed_at": "2019-06-21T01:44:11Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-15T11:54:21Z",
|
||||
"updated_at": "2023-07-21T00:09:00Z",
|
||||
"updated_at": "2023-07-31T12:41:47Z",
|
||||
"pushed_at": "2022-04-04T15:16:08Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "CVE-2020-0096-StrandHogg2 复现",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-07T10:25:25Z",
|
||||
"updated_at": "2022-08-02T06:09:45Z",
|
||||
"updated_at": "2023-07-31T12:57:57Z",
|
||||
"pushed_at": "2021-03-15T11:14:18Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-07-31T03:15:54Z",
|
||||
"updated_at": "2023-07-31T07:21:16Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3824,
|
||||
"watchers_count": 3824,
|
||||
"stargazers_count": 3825,
|
||||
"watchers_count": 3825,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3824,
|
||||
"watchers": 3825,
|
||||
"score": 0,
|
||||
"subscribers_count": 154
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2023-07-25T13:53:30Z",
|
||||
"updated_at": "2023-07-31T10:48:49Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1057,
|
||||
"watchers_count": 1057,
|
||||
"stargazers_count": 1059,
|
||||
"watchers_count": 1059,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1057,
|
||||
"watchers": 1059,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T17:32:24Z",
|
||||
"updated_at": "2023-06-06T04:28:49Z",
|
||||
"updated_at": "2023-07-31T13:04:15Z",
|
||||
"pushed_at": "2021-01-23T01:25:22Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-07-31T03:28:34Z",
|
||||
"updated_at": "2023-07-31T09:07:46Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 991,
|
||||
"watchers_count": 991,
|
||||
"stargazers_count": 993,
|
||||
"watchers_count": 993,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 991,
|
||||
"watchers": 993,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2023-07-25T13:53:30Z",
|
||||
"updated_at": "2023-07-31T10:48:49Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1057,
|
||||
"watchers_count": 1057,
|
||||
"stargazers_count": 1059,
|
||||
"watchers_count": 1059,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1057,
|
||||
"watchers": 1059,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -148,7 +148,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -197,19 +197,19 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2023-07-27T07:46:32Z",
|
||||
"updated_at": "2023-07-31T07:24:50Z",
|
||||
"pushed_at": "2021-12-14T05:12:17Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 121,
|
||||
"forks": 61,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -470,7 +470,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-07-11T06:34:04Z",
|
||||
"updated_at": "2023-07-31T14:08:40Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 887,
|
||||
"watchers_count": 887,
|
||||
|
@ -1074,19 +1074,19 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2023-07-14T06:20:43Z",
|
||||
"updated_at": "2023-07-31T12:57:37Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 611,
|
||||
"watchers_count": 611,
|
||||
"stargazers_count": 613,
|
||||
"watchers_count": 613,
|
||||
"has_discussions": false,
|
||||
"forks_count": 160,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 160,
|
||||
"watchers": 611,
|
||||
"forks": 161,
|
||||
"watchers": 613,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": "a reliable C based exploit and writeup for CVE-2021-3560.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-12T05:22:35Z",
|
||||
"updated_at": "2023-03-10T12:10:08Z",
|
||||
"updated_at": "2023-07-31T07:38:51Z",
|
||||
"pushed_at": "2021-06-23T11:07:32Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -142,10 +142,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2023-07-25T16:42:39Z",
|
||||
"updated_at": "2023-07-31T07:30:30Z",
|
||||
"pushed_at": "2022-11-16T13:14:56Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -154,7 +154,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -878,7 +878,7 @@
|
|||
"description": "PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T13:34:01Z",
|
||||
"updated_at": "2023-01-26T17:02:31Z",
|
||||
"updated_at": "2023-07-31T14:14:50Z",
|
||||
"pushed_at": "2022-01-26T20:17:11Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
|
|
|
@ -2458,10 +2458,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2023-07-25T23:36:35Z",
|
||||
"updated_at": "2023-07-31T08:35:16Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -2479,7 +2479,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 exploits in powershell",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T09:10:14Z",
|
||||
"updated_at": "2023-06-24T12:15:04Z",
|
||||
"updated_at": "2023-07-31T07:27:56Z",
|
||||
"pushed_at": "2022-04-04T08:33:41Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -857,10 +857,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2023-07-28T15:56:14Z",
|
||||
"updated_at": "2023-07-31T14:03:52Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 903,
|
||||
"watchers_count": 903,
|
||||
"stargazers_count": 904,
|
||||
"watchers_count": 904,
|
||||
"has_discussions": false,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
|
@ -889,7 +889,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"watchers": 903,
|
||||
"watchers": 904,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-07-31T00:04:24Z",
|
||||
"updated_at": "2023-07-31T12:27:04Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1626,
|
||||
"watchers_count": 1626,
|
||||
"stargazers_count": 1625,
|
||||
"watchers_count": 1625,
|
||||
"has_discussions": false,
|
||||
"forks_count": 475,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 475,
|
||||
"watchers": 1626,
|
||||
"watchers": 1625,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -6739,10 +6739,10 @@
|
|||
"description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T12:07:05Z",
|
||||
"updated_at": "2023-07-21T16:07:31Z",
|
||||
"updated_at": "2023-07-31T12:42:35Z",
|
||||
"pushed_at": "2021-12-17T07:41:47Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -6751,7 +6751,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"stargazers_count": 1042,
|
||||
"watchers_count": 1042,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"forks": 220,
|
||||
"watchers": 1042,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-07-31T03:28:34Z",
|
||||
"updated_at": "2023-07-31T09:07:46Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 991,
|
||||
"watchers_count": 991,
|
||||
"stargazers_count": 993,
|
||||
"watchers_count": 993,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 991,
|
||||
"watchers": 993,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -605,10 +605,10 @@
|
|||
"description": "CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-18T11:43:00Z",
|
||||
"updated_at": "2023-07-21T22:04:46Z",
|
||||
"updated_at": "2023-07-31T09:03:43Z",
|
||||
"pushed_at": "2023-03-18T11:47:55Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -617,7 +617,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-28T17:42:33Z",
|
||||
"updated_at": "2023-07-28T23:24:12Z",
|
||||
"updated_at": "2023-07-31T13:54:59Z",
|
||||
"pushed_at": "2023-07-28T17:54:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -232,7 +232,7 @@
|
|||
"description": "😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T18:25:26Z",
|
||||
"updated_at": "2023-07-20T00:16:47Z",
|
||||
"updated_at": "2023-07-31T14:14:33Z",
|
||||
"pushed_at": "2023-05-23T03:42:31Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2023-06-24T07:29:23Z",
|
||||
"updated_at": "2023-07-31T07:39:51Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -197,10 +197,10 @@
|
|||
"description": "An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-21T21:22:35Z",
|
||||
"updated_at": "2023-07-30T19:06:22Z",
|
||||
"updated_at": "2023-07-31T14:29:46Z",
|
||||
"pushed_at": "2023-06-21T21:24:52Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -209,7 +209,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T21:26:28Z",
|
||||
"updated_at": "2023-07-09T16:33:05Z",
|
||||
"updated_at": "2023-07-31T09:18:21Z",
|
||||
"pushed_at": "2023-01-19T13:10:07Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 115,
|
||||
"forks": 29,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -28,35 +28,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 598766898,
|
||||
"name": "CVE-2023-0045",
|
||||
"full_name": "es0j\/CVE-2023-0045",
|
||||
"owner": {
|
||||
"login": "es0j",
|
||||
"id": 37257235,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37257235?v=4",
|
||||
"html_url": "https:\/\/github.com\/es0j"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/es0j\/CVE-2023-0045",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T19:12:41Z",
|
||||
"updated_at": "2023-07-24T02:50:42Z",
|
||||
"pushed_at": "2023-02-07T19:15:48Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-0386在ubuntu22.04上的提权",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T03:02:13Z",
|
||||
"updated_at": "2023-07-28T18:10:12Z",
|
||||
"updated_at": "2023-07-31T07:02:48Z",
|
||||
"pushed_at": "2023-06-13T08:58:53Z",
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 348,
|
||||
"watchers": 349,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"has_discussions": false,
|
||||
"forks_count": 163,
|
||||
"forks_count": 164,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 163,
|
||||
"forks": 164,
|
||||
"watchers": 421,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-26T20:03:11Z",
|
||||
"updated_at": "2023-07-27T15:54:03Z",
|
||||
"pushed_at": "2023-07-27T11:51:49Z",
|
||||
"pushed_at": "2023-07-31T09:21:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"cve-2023-20887"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 44,
|
||||
"watchers": 209,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-10T19:08:28Z",
|
||||
"updated_at": "2023-07-29T19:53:10Z",
|
||||
"updated_at": "2023-07-31T13:41:02Z",
|
||||
"pushed_at": "2023-03-10T20:16:53Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -93,7 +93,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 128,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 597984195,
|
||||
"name": "CVE-2023-23333",
|
||||
"full_name": "Timorlover\/CVE-2023-23333",
|
||||
"owner": {
|
||||
"login": "Timorlover",
|
||||
"id": 116296194,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116296194?v=4",
|
||||
"html_url": "https:\/\/github.com\/Timorlover"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Timorlover\/CVE-2023-23333",
|
||||
"description": "There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-06T06:20:40Z",
|
||||
"updated_at": "2023-07-13T20:44:04Z",
|
||||
"pushed_at": "2023-02-06T06:35:29Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 654621817,
|
||||
"name": "CVE-2023-23333",
|
||||
|
|
|
@ -159,36 +159,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 599394994,
|
||||
"name": "KeePass-TriggerLess",
|
||||
"full_name": "digital-dev\/KeePass-TriggerLess",
|
||||
"owner": {
|
||||
"login": "digital-dev",
|
||||
"id": 18492599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18492599?v=4",
|
||||
"html_url": "https:\/\/github.com\/digital-dev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/digital-dev\/KeePass-TriggerLess",
|
||||
"description": "KeePass 2.53.1 with removed ECAS Trigger System Remediating CVE-2023-24055",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-09T03:22:25Z",
|
||||
"updated_at": "2023-02-09T03:23:48Z",
|
||||
"pushed_at": "2023-02-09T21:49:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 601458156,
|
||||
"name": "KeePass-CVE-2023-24055",
|
||||
|
|
|
@ -148,5 +148,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 672880378,
|
||||
"name": "CVE-2023-24488",
|
||||
"full_name": "LazyySec\/CVE-2023-24488",
|
||||
"owner": {
|
||||
"login": "LazyySec",
|
||||
"id": 92903333,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
|
||||
"html_url": "https:\/\/github.com\/LazyySec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-24488",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T11:29:16Z",
|
||||
"updated_at": "2023-07-31T11:31:06Z",
|
||||
"pushed_at": "2023-07-31T11:37:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,12 +43,12 @@
|
|||
"description": "CVE-2023-24489 PoC & Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-26T03:19:20Z",
|
||||
"updated_at": "2023-07-31T05:51:58Z",
|
||||
"updated_at": "2023-07-31T06:51:56Z",
|
||||
"pushed_at": "2023-07-26T03:24:22Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -66,8 +66,8 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 598673740,
|
||||
"name": "jfrog-CVE-2023-25136-OpenSSH_Double-Free",
|
||||
"full_name": "jfrog\/jfrog-CVE-2023-25136-OpenSSH_Double-Free",
|
||||
"owner": {
|
||||
"login": "jfrog",
|
||||
"id": 499942,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499942?v=4",
|
||||
"html_url": "https:\/\/github.com\/jfrog"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jfrog\/jfrog-CVE-2023-25136-OpenSSH_Double-Free",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T15:33:41Z",
|
||||
"updated_at": "2023-07-24T09:21:55Z",
|
||||
"pushed_at": "2023-02-09T09:06:15Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 601784074,
|
||||
"name": "CVE-2023-25136",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 599535214,
|
||||
"name": "CVE-2023-25194",
|
||||
"full_name": "ohnonoyesyes\/CVE-2023-25194",
|
||||
"owner": {
|
||||
"login": "ohnonoyesyes",
|
||||
"id": 93457304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4",
|
||||
"html_url": "https:\/\/github.com\/ohnonoyesyes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2023-25194",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-09T10:49:46Z",
|
||||
"updated_at": "2023-07-07T19:12:23Z",
|
||||
"pushed_at": "2023-02-09T11:00:26Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VM Escape for Parallels Desktop <18.1.1",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T11:47:54Z",
|
||||
"updated_at": "2023-06-20T03:02:10Z",
|
||||
"updated_at": "2023-07-31T14:18:20Z",
|
||||
"pushed_at": "2023-03-20T12:51:29Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T04:59:05Z",
|
||||
"updated_at": "2023-07-31T01:42:09Z",
|
||||
"updated_at": "2023-07-31T07:23:24Z",
|
||||
"pushed_at": "2023-04-30T17:45:27Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "WooCommerce Payments: Unauthorized Admin Access Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-30T23:50:39Z",
|
||||
"updated_at": "2023-07-30T23:44:51Z",
|
||||
"updated_at": "2023-07-31T07:21:58Z",
|
||||
"pushed_at": "2023-05-31T13:21:43Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 35,
|
||||
"forks": 14,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-28T03:06:10Z",
|
||||
"updated_at": "2023-07-31T01:23:09Z",
|
||||
"updated_at": "2023-07-31T13:31:30Z",
|
||||
"pushed_at": "2023-07-28T03:06:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-07-31T02:24:39Z",
|
||||
"updated_at": "2023-07-31T13:58:41Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 339,
|
||||
"watchers": 346,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "DoS against Belkin smart plugs via crafted firmware injection",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T01:11:34Z",
|
||||
"updated_at": "2023-07-29T01:15:29Z",
|
||||
"updated_at": "2023-07-31T13:30:50Z",
|
||||
"pushed_at": "2023-07-29T01:15:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -167,10 +167,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-24T20:51:15Z",
|
||||
"updated_at": "2023-07-27T21:21:14Z",
|
||||
"updated_at": "2023-07-31T10:11:36Z",
|
||||
"pushed_at": "2023-07-24T23:14:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -179,7 +179,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T05:06:27Z",
|
||||
"updated_at": "2023-07-31T05:55:46Z",
|
||||
"updated_at": "2023-07-31T14:17:50Z",
|
||||
"pushed_at": "2023-07-29T16:58:16Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 48,
|
||||
"forks": 15,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -61,19 +61,19 @@
|
|||
},
|
||||
{
|
||||
"id": 672719149,
|
||||
"name": "CVE-2023-35078-Poc-Exploit",
|
||||
"full_name": "LazyySec\/CVE-2023-35078-Poc-Exploit",
|
||||
"name": "CVE-2023-35078",
|
||||
"full_name": "LazyySec\/CVE-2023-35078",
|
||||
"owner": {
|
||||
"login": "LazyySec",
|
||||
"id": 92903333,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
|
||||
"html_url": "https:\/\/github.com\/LazyySec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-35078-Poc-Exploit",
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-35078",
|
||||
"description": "This tool is built in golang language to exploit CVE-2023-35078 vulnerability inspired by similar tool in python language https:\/\/github.com\/vchan-in\/CVE-2023-35078-Exploit-POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T02:24:24Z",
|
||||
"updated_at": "2023-07-31T05:45:03Z",
|
||||
"updated_at": "2023-07-31T07:26:13Z",
|
||||
"pushed_at": "2023-07-31T02:42:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-20T16:05:07Z",
|
||||
"updated_at": "2023-07-31T04:17:57Z",
|
||||
"updated_at": "2023-07-31T09:54:21Z",
|
||||
"pushed_at": "2023-07-23T03:54:44Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -64,7 +64,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Cloudpanel 0-day Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T09:20:22Z",
|
||||
"updated_at": "2023-07-30T21:11:04Z",
|
||||
"updated_at": "2023-07-31T08:02:48Z",
|
||||
"pushed_at": "2023-07-24T01:43:17Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 37,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -236,13 +236,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache RocketMQ Arbitrary File Write Vulnerability Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-14T12:22:45Z",
|
||||
"updated_at": "2023-07-28T01:38:15Z",
|
||||
"updated_at": "2023-07-31T08:26:43Z",
|
||||
"pushed_at": "2023-07-19T02:29:39Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-37847漏洞证明",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-27T02:12:57Z",
|
||||
"updated_at": "2023-07-28T13:49:25Z",
|
||||
"updated_at": "2023-07-31T09:18:56Z",
|
||||
"pushed_at": "2023-07-27T02:18:09Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-21T01:53:10Z",
|
||||
"updated_at": "2023-07-27T09:53:38Z",
|
||||
"updated_at": "2023-07-31T12:46:12Z",
|
||||
"pushed_at": "2023-07-25T22:16:44Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
|
|
|
@ -60,34 +60,34 @@
|
|||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 671910678,
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "Zenmovie\/CVE-2023-38646",
|
||||
"id": 671922179,
|
||||
"name": "CVE-2023-38646-hmoje",
|
||||
"full_name": "hheeyywweellccoommee\/CVE-2023-38646-hmoje",
|
||||
"owner": {
|
||||
"login": "Zenmovie",
|
||||
"id": 98185655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98185655?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zenmovie"
|
||||
"login": "hheeyywweellccoommee",
|
||||
"id": 131327252,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131327252?v=4",
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zenmovie\/CVE-2023-38646",
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee\/CVE-2023-38646-hmoje",
|
||||
"description": "Proof of Concept for CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-28T12:29:16Z",
|
||||
"updated_at": "2023-07-30T01:31:51Z",
|
||||
"created_at": "2023-07-28T13:01:16Z",
|
||||
"updated_at": "2023-07-31T10:59:26Z",
|
||||
"pushed_at": "2023-07-28T12:31:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 671965825,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"description": "Metabase Pre-auth RCE (CVE-2023-38646)!!",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T13:07:00Z",
|
||||
"updated_at": "2023-07-31T03:14:46Z",
|
||||
"updated_at": "2023-07-31T10:12:15Z",
|
||||
"pushed_at": "2023-07-29T14:02:24Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
@ -143,10 +143,11 @@
|
|||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"cve",
|
||||
"cve-2023-38646",
|
||||
"exploit",
|
||||
"metabase"
|
||||
"metabase",
|
||||
"zeroday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
|
@ -246,20 +247,50 @@
|
|||
},
|
||||
{
|
||||
"id": 672759334,
|
||||
"name": "Poc-Metabase-Preauth-CVE-2023-38646",
|
||||
"full_name": "LazyySec\/Poc-Metabase-Preauth-CVE-2023-38646",
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "LazyySec\/CVE-2023-38646",
|
||||
"owner": {
|
||||
"login": "LazyySec",
|
||||
"id": 92903333,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
|
||||
"html_url": "https:\/\/github.com\/LazyySec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/Poc-Metabase-Preauth-CVE-2023-38646",
|
||||
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-38646",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T05:25:37Z",
|
||||
"updated_at": "2023-07-31T05:26:11Z",
|
||||
"pushed_at": "2023-07-31T06:07:05Z",
|
||||
"updated_at": "2023-07-31T07:24:40Z",
|
||||
"pushed_at": "2023-07-31T07:25:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 672876505,
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "Zenmovie\/CVE-2023-38646",
|
||||
"owner": {
|
||||
"login": "Zenmovie",
|
||||
"id": 98185655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98185655?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zenmovie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zenmovie\/CVE-2023-38646",
|
||||
"description": "Proof of Concept for CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T11:18:21Z",
|
||||
"updated_at": "2023-07-31T11:18:21Z",
|
||||
"pushed_at": "2023-07-31T11:20:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
94
README.md
94
README.md
|
@ -7,7 +7,6 @@
|
|||
</code>
|
||||
|
||||
- [ASkyeye/CVE-2023-0045](https://github.com/ASkyeye/CVE-2023-0045)
|
||||
- [es0j/CVE-2023-0045](https://github.com/es0j/CVE-2023-0045)
|
||||
|
||||
### CVE-2023-0050 (2023-03-09)
|
||||
|
||||
|
@ -763,7 +762,6 @@
|
|||
<code>There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
|
||||
</code>
|
||||
|
||||
- [Timorlover/CVE-2023-23333](https://github.com/Timorlover/CVE-2023-23333)
|
||||
- [Mr-xn/CVE-2023-23333](https://github.com/Mr-xn/CVE-2023-23333)
|
||||
- [WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333](https://github.com/WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333)
|
||||
|
||||
|
@ -876,7 +874,6 @@
|
|||
- [Cyb3rtus/keepass_CVE-2023-24055_yara_rule](https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule)
|
||||
- [ATTACKnDEFEND/CVE-2023-24055](https://github.com/ATTACKnDEFEND/CVE-2023-24055)
|
||||
- [julesbozouklian/PoC_CVE-2023-24055](https://github.com/julesbozouklian/PoC_CVE-2023-24055)
|
||||
- [digital-dev/KeePass-TriggerLess](https://github.com/digital-dev/KeePass-TriggerLess)
|
||||
- [zwlsix/KeePass-CVE-2023-24055](https://github.com/zwlsix/KeePass-CVE-2023-24055)
|
||||
|
||||
### CVE-2023-24059 (2023-01-22)
|
||||
|
@ -914,6 +911,7 @@
|
|||
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
|
||||
- [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488)
|
||||
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
|
||||
- [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
|
||||
|
||||
### CVE-2023-24489 (2023-07-10)
|
||||
|
||||
|
@ -959,7 +957,6 @@
|
|||
<code>OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
|
||||
</code>
|
||||
|
||||
- [jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free](https://github.com/jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free)
|
||||
- [ticofookfook/CVE-2023-25136](https://github.com/ticofookfook/CVE-2023-25136)
|
||||
- [Christbowel/CVE-2023-25136](https://github.com/Christbowel/CVE-2023-25136)
|
||||
- [adhikara13/CVE-2023-25136](https://github.com/adhikara13/CVE-2023-25136)
|
||||
|
@ -979,13 +976,6 @@
|
|||
- [7imbitz/CVE-2023-25157-checker](https://github.com/7imbitz/CVE-2023-25157-checker)
|
||||
- [EmmanuelCruzL/CVE-2023-25157](https://github.com/EmmanuelCruzL/CVE-2023-25157)
|
||||
|
||||
### CVE-2023-25194 (2023-02-07)
|
||||
|
||||
<code>A possible security vulnerability has been identified in Apache Kafka Connect API.\nThis requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config\nand a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0.\nWhen configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config`\nproperty for any of the connector's Kafka clients to "com.sun.security.auth.module.JndiLoginModule", which can be done via the\n`producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties.\nThis will allow the server to connect to the attacker's LDAP server\nand deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server.\nAttacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.\n\nSince Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box\nconfigurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector\nclient override policy that permits them.\n\nSince Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage\nin SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka Connect 3.4.0. \n\nWe advise the Kafka Connect users to validate connector configurations and only allow trusted JNDI configurations. Also examine connector dependencies for \nvulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally,\nin addition to leveraging the "org.apache.kafka.disallowed.login.modules" system property, Kafka Connect users can also implement their own connector\nclient config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.\n
|
||||
</code>
|
||||
|
||||
- [ohnonoyesyes/CVE-2023-25194](https://github.com/ohnonoyesyes/CVE-2023-25194)
|
||||
|
||||
### CVE-2023-25234 (2023-02-27)
|
||||
|
||||
<code>Tenda AC500 V2.0.1.9(1307) is vulnerable to Buffer Overflow in function fromAddressNat via parameters entrys and mitInterface.
|
||||
|
@ -2289,7 +2279,7 @@
|
|||
|
||||
- [vchan-in/CVE-2023-35078-Exploit-POC](https://github.com/vchan-in/CVE-2023-35078-Exploit-POC)
|
||||
- [lager1/CVE-2023-35078](https://github.com/lager1/CVE-2023-35078)
|
||||
- [LazyySec/CVE-2023-35078-Poc-Exploit](https://github.com/LazyySec/CVE-2023-35078-Poc-Exploit)
|
||||
- [LazyySec/CVE-2023-35078](https://github.com/LazyySec/CVE-2023-35078)
|
||||
|
||||
### CVE-2023-35086 (2023-07-21)
|
||||
|
||||
|
@ -2530,13 +2520,14 @@
|
|||
|
||||
- [adriyansyah-mf/CVE-2023-38646--Metabase-](https://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-)
|
||||
- [Pumpkin-Garden/POC_Metabase_CVE-2023-38646](https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646)
|
||||
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
|
||||
- [hheeyywweellccoommee/CVE-2023-38646-hmoje](https://github.com/hheeyywweellccoommee/CVE-2023-38646-hmoje)
|
||||
- [hheeyywweellccoommee/CVE-2023-38646-suynl](https://github.com/hheeyywweellccoommee/CVE-2023-38646-suynl)
|
||||
- [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646)
|
||||
- [hheeyywweellccoommee/CVE-2023-38646-glwax](https://github.com/hheeyywweellccoommee/CVE-2023-38646-glwax)
|
||||
- [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc)
|
||||
- [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646)
|
||||
- [LazyySec/Poc-Metabase-Preauth-CVE-2023-38646](https://github.com/LazyySec/Poc-Metabase-Preauth-CVE-2023-38646)
|
||||
- [LazyySec/CVE-2023-38646](https://github.com/LazyySec/CVE-2023-38646)
|
||||
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
|
||||
|
||||
### CVE-2023-39144
|
||||
- [cduram/CVE-2023-39144](https://github.com/cduram/CVE-2023-39144)
|
||||
|
@ -27084,6 +27075,13 @@
|
|||
|
||||
- [lanrat/tethr](https://github.com/lanrat/tethr)
|
||||
|
||||
### CVE-2017-0564 (2017-04-07)
|
||||
|
||||
<code>An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203.
|
||||
</code>
|
||||
|
||||
- [guoygang/CVE-2017-0564-ION-PoC](https://github.com/guoygang/CVE-2017-0564-ION-PoC)
|
||||
|
||||
### CVE-2017-0781 (2017-09-14)
|
||||
|
||||
<code>A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
|
||||
|
@ -27106,6 +27104,7 @@
|
|||
- [Alfa100001/-CVE-2017-0785-BlueBorne-PoC](https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC)
|
||||
- [Hackerscript/BlueBorne-CVE-2017-0785](https://github.com/Hackerscript/BlueBorne-CVE-2017-0785)
|
||||
- [pieterbork/blueborne](https://github.com/pieterbork/blueborne)
|
||||
- [sigbitsadmin/diff](https://github.com/sigbitsadmin/diff)
|
||||
- [RavSS/Bluetooth-Crash-CVE-2017-0785](https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785)
|
||||
- [sh4rknado/BlueBorn](https://github.com/sh4rknado/BlueBorn)
|
||||
- [Joanmei/CVE-2017-0785](https://github.com/Joanmei/CVE-2017-0785)
|
||||
|
@ -27118,6 +27117,13 @@
|
|||
|
||||
- [michalbednarski/ReparcelBug](https://github.com/michalbednarski/ReparcelBug)
|
||||
|
||||
### CVE-2017-0807 (2017-10-03)
|
||||
|
||||
<code>An elevation of privilege vulnerability in the Android framework (ui framework). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-35056974.
|
||||
</code>
|
||||
|
||||
- [kpatsakis/PoC_CVE-2017-0807](https://github.com/kpatsakis/PoC_CVE-2017-0807)
|
||||
|
||||
### CVE-2017-1635 (2017-12-13)
|
||||
|
||||
<code>IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free error. A remote attacker could exploit this vulnerability to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 133243.
|
||||
|
@ -27412,6 +27418,7 @@
|
|||
- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
|
||||
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
|
||||
- [pr0x1ma-byte/cybersecurity-struts2](https://github.com/pr0x1ma-byte/cybersecurity-struts2)
|
||||
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
|
||||
- [0x00-0x00/CVE-2017-5638](https://github.com/0x00-0x00/CVE-2017-5638)
|
||||
- [m3ssap0/struts2_cve-2017-5638](https://github.com/m3ssap0/struts2_cve-2017-5638)
|
||||
- [Greynad/struts2-jakarta-inject](https://github.com/Greynad/struts2-jakarta-inject)
|
||||
|
@ -27469,8 +27476,10 @@
|
|||
<code>Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
|
||||
</code>
|
||||
|
||||
- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
|
||||
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
|
||||
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
|
||||
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
|
||||
|
||||
### CVE-2017-5721 (2017-10-10)
|
||||
|
||||
|
@ -27484,6 +27493,12 @@
|
|||
<code>Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
|
||||
</code>
|
||||
|
||||
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
|
||||
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
|
||||
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
|
||||
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
|
||||
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
|
||||
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
|
||||
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
|
||||
|
||||
### CVE-2017-5754 (2018-01-04)
|
||||
|
@ -27494,7 +27509,9 @@
|
|||
- [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck)
|
||||
- [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown)
|
||||
- [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown)
|
||||
- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown)
|
||||
- [zzado/Meltdown](https://github.com/zzado/Meltdown)
|
||||
- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner)
|
||||
|
||||
### CVE-2017-5792 (2018-02-15)
|
||||
|
||||
|
@ -27580,6 +27597,7 @@
|
|||
<code>The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697.
|
||||
</code>
|
||||
|
||||
- [GarnetSunset/CiscoSpectreTakeover](https://github.com/GarnetSunset/CiscoSpectreTakeover)
|
||||
- [GarnetSunset/CiscoIOSSNMPToolkit](https://github.com/GarnetSunset/CiscoIOSSNMPToolkit)
|
||||
|
||||
### CVE-2017-6913 (2018-09-18)
|
||||
|
@ -27634,6 +27652,14 @@
|
|||
|
||||
- [bazad/sysctl_coalition_get_pid_list-dos](https://github.com/bazad/sysctl_coalition_get_pid_list-dos)
|
||||
|
||||
### CVE-2017-7184 (2017-03-19)
|
||||
|
||||
<code>The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.
|
||||
</code>
|
||||
|
||||
- [rockl/cve-2017-7184](https://github.com/rockl/cve-2017-7184)
|
||||
- [rockl/cve-2017-7184-bak](https://github.com/rockl/cve-2017-7184-bak)
|
||||
|
||||
### CVE-2017-7188 (2017-04-14)
|
||||
|
||||
<code>Zurmo 3.1.1 Stable allows a Cross-Site Scripting (XSS) attack with a base64-encoded SCRIPT element within a data: URL in the returnUrl parameter to default/toggleCollapse.
|
||||
|
@ -27657,6 +27683,7 @@
|
|||
- [homjxi0e/cve-2017-7269](https://github.com/homjxi0e/cve-2017-7269)
|
||||
- [xiaovpn/CVE-2017-7269](https://github.com/xiaovpn/CVE-2017-7269)
|
||||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
|
||||
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
|
||||
|
@ -27888,6 +27915,7 @@
|
|||
</code>
|
||||
|
||||
- [temesgeny/ppsx-file-generator](https://github.com/temesgeny/ppsx-file-generator)
|
||||
- [rxwx/CVE-2017-8570](https://github.com/rxwx/CVE-2017-8570)
|
||||
- [MaxSecurity/Office-CVE-2017-8570](https://github.com/MaxSecurity/Office-CVE-2017-8570)
|
||||
- [SwordSheath/CVE-2017-8570](https://github.com/SwordSheath/CVE-2017-8570)
|
||||
- [Drac0nids/CVE-2017-8570](https://github.com/Drac0nids/CVE-2017-8570)
|
||||
|
@ -27945,6 +27973,13 @@
|
|||
|
||||
- [drbothen/GO-RPCBOMB](https://github.com/drbothen/GO-RPCBOMB)
|
||||
|
||||
### CVE-2017-8802 (2018-01-16)
|
||||
|
||||
<code>Cross-site scripting (XSS) vulnerability in Zimbra Collaboration Suite (aka ZCS) before 8.8.0 Beta2 might allow remote attackers to inject arbitrary web script or HTML via vectors related to the "Show Snippet" functionality.
|
||||
</code>
|
||||
|
||||
- [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx)
|
||||
|
||||
### CVE-2017-8809 (2017-11-15)
|
||||
|
||||
<code>api.php in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has a Reflected File Download vulnerability.
|
||||
|
@ -28204,10 +28239,12 @@
|
|||
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
|
||||
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
|
||||
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
|
||||
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
|
||||
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
|
||||
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
|
||||
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
|
||||
- [bmcculley/CVE-2017-10271](https://github.com/bmcculley/CVE-2017-10271)
|
||||
- [peterpeter228/Oracle-WebLogic-CVE-2017-10271](https://github.com/peterpeter228/Oracle-WebLogic-CVE-2017-10271)
|
||||
- [Cymmetria/weblogic_honeypot](https://github.com/Cymmetria/weblogic_honeypot)
|
||||
- [JackyTsuuuy/weblogic_wls_rce_poc-exp](https://github.com/JackyTsuuuy/weblogic_wls_rce_poc-exp)
|
||||
- [R0B1NL1N/Oracle-WebLogic-WLS-WSAT](https://github.com/R0B1NL1N/Oracle-WebLogic-WLS-WSAT)
|
||||
|
@ -28255,6 +28292,9 @@
|
|||
|
||||
- [GeneBlue/CVE-2017-10661_POC](https://github.com/GeneBlue/CVE-2017-10661_POC)
|
||||
|
||||
### CVE-2017-10797
|
||||
- [n4xh4ck5/CVE-2017-10797](https://github.com/n4xh4ck5/CVE-2017-10797)
|
||||
|
||||
### CVE-2017-10952 (2017-08-29)
|
||||
|
||||
<code>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the saveAs JavaScript function. The issue results from the lack of proper validation of user-supplied data, which can lead to writing arbitrary files into attacker controlled locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4518.
|
||||
|
@ -28365,6 +28405,9 @@
|
|||
- [CSC-pentest/cve-2017-11882](https://github.com/CSC-pentest/cve-2017-11882)
|
||||
- [Shadowshusky/CVE-2017-11882-](https://github.com/Shadowshusky/CVE-2017-11882-)
|
||||
- [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802)
|
||||
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802)
|
||||
- [likescam/CVE-2017-11882](https://github.com/likescam/CVE-2017-11882)
|
||||
- [likescam/CVE-2018-0802_CVE-2017-11882](https://github.com/likescam/CVE-2018-0802_CVE-2017-11882)
|
||||
- [herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam](https://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam)
|
||||
- [ChaitanyaHaritash/CVE-2017-11882](https://github.com/ChaitanyaHaritash/CVE-2017-11882)
|
||||
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
|
||||
|
@ -28807,6 +28850,13 @@
|
|||
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
|
||||
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
|
||||
|
||||
### CVE-2017-16997 (2017-12-17)
|
||||
|
||||
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
|
||||
</code>
|
||||
|
||||
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
|
||||
|
||||
### CVE-2017-17058 (2017-11-29)
|
||||
|
||||
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code.
|
||||
|
@ -28861,6 +28911,13 @@
|
|||
- [fssecur3/goahead-rce-exploit](https://github.com/fssecur3/goahead-rce-exploit)
|
||||
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
|
||||
|
||||
### CVE-2017-17692 (2017-12-21)
|
||||
|
||||
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
|
||||
</code>
|
||||
|
||||
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
|
||||
|
||||
### CVE-2017-17736 (2018-03-23)
|
||||
|
||||
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
|
||||
|
@ -29031,6 +29088,13 @@
|
|||
|
||||
- [bindecy/HugeDirtyCowPOC](https://github.com/bindecy/HugeDirtyCowPOC)
|
||||
|
||||
### CVE-2017-1000475 (2018-01-24)
|
||||
|
||||
<code>FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges.
|
||||
</code>
|
||||
|
||||
- [lajarajorge/CVE-2017-1000475](https://github.com/lajarajorge/CVE-2017-1000475)
|
||||
|
||||
### CVE-2017-1000486 (2018-01-03)
|
||||
|
||||
<code>Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
|
||||
|
@ -31761,7 +31825,7 @@
|
|||
|
||||
- [chef-boneyard/bash-shellshock](https://github.com/chef-boneyard/bash-shellshock)
|
||||
- [gina-alaska/bash-cve-2014-7169-cookbook](https://github.com/gina-alaska/bash-cve-2014-7169-cookbook)
|
||||
- [prince-stark/SHELL-SCHOCK](https://github.com/prince-stark/SHELL-SCHOCK)
|
||||
- [Gobinath-B/SHELL-SCHOCK](https://github.com/Gobinath-B/SHELL-SCHOCK)
|
||||
|
||||
### CVE-2014-7205 (2014-10-08)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue