Auto Update 2023/07/31 14:32:33

This commit is contained in:
motikan2010-bot 2023-07-31 23:32:33 +09:00
parent 466b33fb8f
commit f6ad226b5b
78 changed files with 1313 additions and 418 deletions

View file

@ -1038,10 +1038,10 @@
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
"fork": false,
"created_at": "2015-03-08T19:54:33Z",
"updated_at": "2023-07-22T13:10:57Z",
"updated_at": "2023-07-31T11:17:20Z",
"pushed_at": "2021-02-20T19:41:03Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -1050,7 +1050,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 6
},

View file

@ -2081,7 +2081,7 @@
"fork": false,
"created_at": "2023-07-01T03:50:02Z",
"updated_at": "2023-07-08T05:28:31Z",
"pushed_at": "2023-07-08T05:29:30Z",
"pushed_at": "2023-07-31T12:27:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -62,14 +62,14 @@
{
"id": 517399645,
"name": "SHELL-SCHOCK",
"full_name": "prince-stark\/SHELL-SCHOCK",
"full_name": "Gobinath-B\/SHELL-SCHOCK",
"owner": {
"login": "prince-stark",
"login": "Gobinath-B",
"id": 81898167,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81898167?v=4",
"html_url": "https:\/\/github.com\/prince-stark"
"html_url": "https:\/\/github.com\/Gobinath-B"
},
"html_url": "https:\/\/github.com\/prince-stark\/SHELL-SCHOCK",
"html_url": "https:\/\/github.com\/Gobinath-B\/SHELL-SCHOCK",
"description": "CVE-2014-7169 Shell Shock",
"fork": false,
"created_at": "2022-07-24T18:03:30Z",

View file

@ -327,10 +327,10 @@
"description": "Scan vuls kernel CVE-2016-5195 - DirtyCow",
"fork": false,
"created_at": "2016-10-29T08:45:45Z",
"updated_at": "2023-06-26T12:35:37Z",
"updated_at": "2023-07-31T12:26:18Z",
"pushed_at": "2016-10-29T08:50:34Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -339,7 +339,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

32
2017/CVE-2017-0564.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 117041381,
"name": "CVE-2017-0564-ION-PoC",
"full_name": "guoygang\/CVE-2017-0564-ION-PoC",
"owner": {
"login": "guoygang",
"id": 16954452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16954452?v=4",
"html_url": "https:\/\/github.com\/guoygang"
},
"html_url": "https:\/\/github.com\/guoygang\/CVE-2017-0564-ION-PoC",
"description": "ION通用提权漏洞PoC以及分析",
"fork": false,
"created_at": "2018-01-11T02:50:26Z",
"updated_at": "2022-05-26T08:30:12Z",
"pushed_at": "2018-01-11T02:53:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -154,6 +154,36 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 116589306,
"name": "diff",
"full_name": "sigbitsadmin\/diff",
"owner": {
"login": "sigbitsadmin",
"id": 33204560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204560?v=4",
"html_url": "https:\/\/github.com\/sigbitsadmin"
},
"html_url": "https:\/\/github.com\/sigbitsadmin\/diff",
"description": "Simply diff for CVE-2017-0785",
"fork": false,
"created_at": "2018-01-07T18:30:42Z",
"updated_at": "2018-01-07T18:31:03Z",
"pushed_at": "2018-01-07T18:31:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 122293991,
"name": "Bluetooth-Crash-CVE-2017-0785",

36
2017/CVE-2017-0807.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 117631583,
"name": "PoC_CVE-2017-0807",
"full_name": "kpatsakis\/PoC_CVE-2017-0807",
"owner": {
"login": "kpatsakis",
"id": 9294190,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9294190?v=4",
"html_url": "https:\/\/github.com\/kpatsakis"
},
"html_url": "https:\/\/github.com\/kpatsakis\/PoC_CVE-2017-0807",
"description": "Proof of concept of CVE-2017-0807",
"fork": false,
"created_at": "2018-01-16T04:34:06Z",
"updated_at": "2018-11-26T05:17:02Z",
"pushed_at": "2018-01-16T04:55:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"android",
"cve-2017-0807",
"security"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -0,0 +1,32 @@
[
{
"id": 118515767,
"name": "CVE-2017-1000475",
"full_name": "lajarajorge\/CVE-2017-1000475",
"owner": {
"login": "lajarajorge",
"id": 35707370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35707370?v=4",
"html_url": "https:\/\/github.com\/lajarajorge"
},
"html_url": "https:\/\/github.com\/lajarajorge\/CVE-2017-1000475",
"description": "Unquoted Path Service",
"fork": false,
"created_at": "2018-01-22T21:10:22Z",
"updated_at": "2018-01-22T21:10:22Z",
"pushed_at": "2018-01-22T21:34:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -149,6 +149,36 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 116099094,
"name": "weblogic_wls_wsat_rce",
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
"owner": {
"login": "cjjduck",
"id": 23519154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
"html_url": "https:\/\/github.com\/cjjduck"
},
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
"updated_at": "2020-10-09T02:33:00Z",
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 116430643,
"name": "CVE-2017-10271",
@ -269,6 +299,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 118144871,
"name": "Oracle-WebLogic-CVE-2017-10271",
"full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
"owner": {
"login": "peterpeter228",
"id": 22089258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22089258?v=4",
"html_url": "https:\/\/github.com\/peterpeter228"
},
"html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
"fork": false,
"created_at": "2018-01-19T15:50:08Z",
"updated_at": "2021-11-27T15:58:13Z",
"pushed_at": "2018-01-19T11:29:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 120571410,
"name": "weblogic_honeypot",

32
2017/CVE-2017-10797.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 119376202,
"name": "CVE-2017-10797",
"full_name": "n4xh4ck5\/CVE-2017-10797",
"owner": {
"login": "n4xh4ck5",
"id": 26029224,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26029224?v=4",
"html_url": "https:\/\/github.com\/n4xh4ck5"
},
"html_url": "https:\/\/github.com\/n4xh4ck5\/CVE-2017-10797",
"description": "CVE-2017-10797- User Enumeration in OwnCloud Server 8.1-10.0",
"fork": false,
"created_at": "2018-01-29T11:53:14Z",
"updated_at": "2020-03-26T17:06:19Z",
"pushed_at": "2018-01-29T11:56:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -396,6 +396,96 @@
"score": 0,
"subscribers_count": 18
},
{
"id": 117234193,
"name": "RTF_11882_0802",
"full_name": "Ridter\/RTF_11882_0802",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2023-07-07T19:10:31Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 165,
"score": 0,
"subscribers_count": 8
},
{
"id": 117637164,
"name": "CVE-2017-11882",
"full_name": "likescam\/CVE-2017-11882",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2018-01-16T05:47:47Z",
"updated_at": "2018-01-16T05:47:59Z",
"pushed_at": "2018-01-16T05:47:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 117637270,
"name": "CVE-2018-0802_CVE-2017-11882",
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2018-01-16T05:49:01Z",
"updated_at": "2023-06-12T17:45:56Z",
"pushed_at": "2018-01-16T05:49:10Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 130633082,
"name": "CVE-2017-11882-Possible-Remcos-Malspam",

32
2017/CVE-2017-16997.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 116118639,
"name": "CVE-2017-16997-poc",
"full_name": "Xiami2012\/CVE-2017-16997-poc",
"owner": {
"login": "Xiami2012",
"id": 1927254,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
"html_url": "https:\/\/github.com\/Xiami2012"
},
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
"description": "A proof-of-concept for CVE-2017-16997",
"fork": false,
"created_at": "2018-01-03T09:31:55Z",
"updated_at": "2018-01-03T09:33:01Z",
"pushed_at": "2018-01-03T10:39:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}
]

32
2017/CVE-2017-17692.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 116205741,
"name": "CVE-2017-17692",
"full_name": "specloli\/CVE-2017-17692",
"owner": {
"login": "specloli",
"id": 10647366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
"html_url": "https:\/\/github.com\/specloli"
},
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
"description": null,
"fork": false,
"created_at": "2018-01-04T02:40:13Z",
"updated_at": "2021-11-23T15:08:43Z",
"pushed_at": "2018-01-02T13:58:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -163,12 +163,12 @@
"description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ",
"fork": false,
"created_at": "2017-03-10T16:56:14Z",
"updated_at": "2023-07-20T10:16:09Z",
"updated_at": "2023-07-31T09:51:36Z",
"pushed_at": "2017-03-12T15:43:27Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -183,8 +183,8 @@
"struts2"
],
"visibility": "public",
"forks": 24,
"watchers": 15,
"forks": 25,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},
@ -415,12 +415,12 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2023-07-25T14:13:14Z",
"updated_at": "2023-07-31T09:51:29Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 413,
"watchers_count": 413,
"stargazers_count": 414,
"watchers_count": 414,
"has_discussions": false,
"forks_count": 150,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -432,8 +432,8 @@
"struts-pwn"
],
"visibility": "public",
"forks": 150,
"watchers": 413,
"forks": 151,
"watchers": 414,
"score": 0,
"subscribers_count": 21
},
@ -1385,6 +1385,36 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 119230111,
"name": "apache-struts-v2-CVE-2017-5638",
"full_name": "cafnet\/apache-struts-v2-CVE-2017-5638",
"owner": {
"login": "cafnet",
"id": 12993208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12993208?v=4",
"html_url": "https:\/\/github.com\/cafnet"
},
"html_url": "https:\/\/github.com\/cafnet\/apache-struts-v2-CVE-2017-5638",
"description": "Working POC for CVE 2017-5638",
"fork": false,
"created_at": "2018-01-28T05:17:04Z",
"updated_at": "2018-01-28T05:55:11Z",
"pushed_at": "2018-01-28T05:55:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 121659152,
"name": "CVE-2017-5638",

View file

@ -1,4 +1,39 @@
[
{
"id": 116768537,
"name": "exploit-cve-2017-5715",
"full_name": "opsxcq\/exploit-cve-2017-5715",
"owner": {
"login": "opsxcq",
"id": 16995025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
"html_url": "https:\/\/github.com\/opsxcq"
},
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
"description": "Spectre exploit",
"fork": false,
"created_at": "2018-01-09T05:06:12Z",
"updated_at": "2023-03-10T11:59:44Z",
"pushed_at": "2018-01-09T22:27:25Z",
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"intelbug",
"memory-leak",
"spectre"
],
"visibility": "public",
"forks": 19,
"watchers": 52,
"score": 0,
"subscribers_count": 4
},
{
"id": 117425769,
"name": "meltdown-spectre-bios-list",
@ -66,5 +101,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 117944815,
"name": "retpoline-audit",
"full_name": "dmo2118\/retpoline-audit",
"owner": {
"login": "dmo2118",
"id": 11342823,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11342823?v=4",
"html_url": "https:\/\/github.com\/dmo2118"
},
"html_url": "https:\/\/github.com\/dmo2118\/retpoline-audit",
"description": "A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715).",
"fork": false,
"created_at": "2018-01-18T06:55:53Z",
"updated_at": "2018-01-20T08:00:58Z",
"pushed_at": "2018-02-01T07:40:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,211 @@
[
{
"id": 116195445,
"name": "spectre-attack",
"full_name": "Eugnis\/spectre-attack",
"owner": {
"login": "Eugnis",
"id": 2463830,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2463830?v=4",
"html_url": "https:\/\/github.com\/Eugnis"
},
"html_url": "https:\/\/github.com\/Eugnis\/spectre-attack",
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2023-07-28T01:58:24Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 727,
"watchers_count": 727,
"has_discussions": false,
"forks_count": 185,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"c",
"example",
"exploit",
"security-vulnerability",
"spectre"
],
"visibility": "public",
"forks": 185,
"watchers": 727,
"score": 0,
"subscribers_count": 41
},
{
"id": 116268310,
"name": "Spectre-PoC",
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
"owner": {
"login": "EdwardOwusuAdjei",
"id": 16462560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
},
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
"fork": false,
"created_at": "2018-01-04T14:20:13Z",
"updated_at": "2020-03-29T03:06:24Z",
"pushed_at": "2018-01-04T14:27:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 3
},
{
"id": 116347505,
"name": "spectre-attack-example",
"full_name": "poilynx\/spectre-attack-example",
"owner": {
"login": "poilynx",
"id": 8926090,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
"html_url": "https:\/\/github.com\/poilynx"
},
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
"fork": false,
"created_at": "2018-01-05T05:51:34Z",
"updated_at": "2021-02-24T01:25:15Z",
"pushed_at": "2018-01-05T05:56:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 116442461,
"name": "spectre-attack-demo",
"full_name": "pedrolucasoliva\/spectre-attack-demo",
"owner": {
"login": "pedrolucasoliva",
"id": 10757421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4",
"html_url": "https:\/\/github.com\/pedrolucasoliva"
},
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-06T01:08:15Z",
"updated_at": "2018-01-15T06:12:51Z",
"pushed_at": "2018-01-06T01:09:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 116505944,
"name": "spectreScope",
"full_name": "ixtal23\/spectreScope",
"owner": {
"login": "ixtal23",
"id": 11915559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11915559?v=4",
"html_url": "https:\/\/github.com\/ixtal23"
},
"html_url": "https:\/\/github.com\/ixtal23\/spectreScope",
"description": "The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715).",
"fork": false,
"created_at": "2018-01-06T18:27:03Z",
"updated_at": "2023-02-03T09:00:16Z",
"pushed_at": "2018-01-21T22:48:08Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apple",
"centos",
"cmake",
"cpp",
"demo",
"digitalocean",
"exploit",
"intelbug",
"linux",
"macos",
"oracle",
"proofofconcept",
"redhat",
"solaris",
"sparc",
"spectre",
"spectrescope",
"sunos",
"vulnerability",
"windows"
],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 116532057,
"name": "cve-2017-5753",
"full_name": "albertleecn\/cve-2017-5753",
"owner": {
"login": "albertleecn",
"id": 4608961,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4608961?v=4",
"html_url": "https:\/\/github.com\/albertleecn"
},
"html_url": "https:\/\/github.com\/albertleecn\/cve-2017-5753",
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
"fork": false,
"created_at": "2018-01-07T02:46:38Z",
"updated_at": "2021-03-31T12:50:11Z",
"pushed_at": "2018-01-06T13:06:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 263311084,
"name": "Spectre-Vulnerability-CVE-2017-5753-",

View file

@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 17
},
{
"id": 116449314,
"name": "Am-I-affected-by-Meltdown",
"full_name": "speecyy\/Am-I-affected-by-Meltdown",
"owner": {
"login": "speecyy",
"id": 35145287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4",
"html_url": "https:\/\/github.com\/speecyy"
},
"html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
"description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
"fork": false,
"created_at": "2018-01-06T03:16:33Z",
"updated_at": "2020-02-27T19:31:43Z",
"pushed_at": "2018-01-06T03:17:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 118008705,
"name": "Meltdown",
@ -148,5 +178,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 119104266,
"name": "meltdown-aws-scanner",
"full_name": "jdmulloy\/meltdown-aws-scanner",
"owner": {
"login": "jdmulloy",
"id": 3395292,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4",
"html_url": "https:\/\/github.com\/jdmulloy"
},
"html_url": "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner",
"description": "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances",
"fork": false,
"created_at": "2018-01-26T21:18:13Z",
"updated_at": "2019-02-27T18:46:20Z",
"pushed_at": "2018-01-26T21:25:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 117869057,
"name": "CiscoSpectreTakeover",
"full_name": "GarnetSunset\/CiscoSpectreTakeover",
"owner": {
"login": "GarnetSunset",
"id": 13430434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13430434?v=4",
"html_url": "https:\/\/github.com\/GarnetSunset"
},
"html_url": "https:\/\/github.com\/GarnetSunset\/CiscoSpectreTakeover",
"description": "A POC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into Spectre (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-17T17:26:14Z",
"updated_at": "2022-09-20T07:16:36Z",
"pushed_at": "2018-01-23T19:54:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 4
},
{
"id": 118516301,
"name": "CiscoIOSSNMPToolkit",

62
2017/CVE-2017-7184.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 118847628,
"name": "cve-2017-7184",
"full_name": "rockl\/cve-2017-7184",
"owner": {
"login": "rockl",
"id": 2081161,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2081161?v=4",
"html_url": "https:\/\/github.com\/rockl"
},
"html_url": "https:\/\/github.com\/rockl\/cve-2017-7184",
"description": " the job is not yet finished",
"fork": false,
"created_at": "2018-01-25T01:55:47Z",
"updated_at": "2018-01-25T01:55:47Z",
"pushed_at": "2018-01-25T01:55:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 118849076,
"name": "cve-2017-7184-bak",
"full_name": "rockl\/cve-2017-7184-bak",
"owner": {
"login": "rockl",
"id": 2081161,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2081161?v=4",
"html_url": "https:\/\/github.com\/rockl"
},
"html_url": "https:\/\/github.com\/rockl\/cve-2017-7184-bak",
"description": "not yet fin",
"fork": false,
"created_at": "2018-01-25T02:10:45Z",
"updated_at": "2018-01-25T02:10:45Z",
"pushed_at": "2018-01-25T02:10:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -334,6 +334,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 118708741,
"name": "CVE-2017-7269",
"full_name": "mirrorblack\/CVE-2017-7269",
"owner": {
"login": "mirrorblack",
"id": 33338951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33338951?v=4",
"html_url": "https:\/\/github.com\/mirrorblack"
},
"html_url": "https:\/\/github.com\/mirrorblack\/CVE-2017-7269",
"description": "CVE-2017-7269利用代码rb文件",
"fork": false,
"created_at": "2018-01-24T03:51:58Z",
"updated_at": "2018-01-24T03:51:58Z",
"pushed_at": "2018-01-24T03:51:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 131371800,
"name": "CVE-2017-7269",

View file

@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 7
},
{
"id": 116858521,
"name": "CVE-2017-8570",
"full_name": "rxwx\/CVE-2017-8570",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx"
},
"html_url": "https:\/\/github.com\/rxwx\/CVE-2017-8570",
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2023-06-27T20:52:06Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 182,
"score": 0,
"subscribers_count": 9
},
{
"id": 122914059,
"name": "Office-CVE-2017-8570",

32
2017/CVE-2017-8802.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 118624965,
"name": "Zimbra-CVE-2017-8802-Hotifx",
"full_name": "ozzi-\/Zimbra-CVE-2017-8802-Hotifx",
"owner": {
"login": "ozzi-",
"id": 7944573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7944573?v=4",
"html_url": "https:\/\/github.com\/ozzi-"
},
"html_url": "https:\/\/github.com\/ozzi-\/Zimbra-CVE-2017-8802-Hotifx",
"description": "Security hotfix for CVE-2017-8802 ",
"fork": false,
"created_at": "2018-01-23T14:56:18Z",
"updated_at": "2018-01-23T14:56:59Z",
"pushed_at": "2018-01-23T14:58:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2023-07-09T08:49:43Z",
"updated_at": "2023-07-31T08:41:39Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 486,
"watchers_count": 486,
"stargazers_count": 487,
"watchers_count": 487,
"has_discussions": false,
"forks_count": 190,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 190,
"watchers": 486,
"watchers": 487,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
"fork": false,
"created_at": "2019-01-23T14:53:19Z",
"updated_at": "2023-05-05T15:40:36Z",
"updated_at": "2023-07-31T12:40:27Z",
"pushed_at": "2022-08-28T08:21:26Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2023-07-24T07:53:34Z",
"updated_at": "2023-07-31T12:49:36Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 334,
"watchers_count": 334,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 333,
"watchers": 334,
"score": 0,
"subscribers_count": 11
}

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-07-31T03:15:54Z",
"updated_at": "2023-07-31T07:21:16Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3824,
"watchers_count": 3824,
"stargazers_count": 3825,
"watchers_count": 3825,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1085,
"watchers": 3824,
"watchers": 3825,
"score": 0,
"subscribers_count": 154
},

View file

@ -253,10 +253,10 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2023-07-28T12:49:46Z",
"updated_at": "2023-07-31T08:12:38Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -265,7 +265,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 182,
"watchers": 183,
"score": 0,
"subscribers_count": 7
},
@ -343,10 +343,10 @@
"description": "CVE-2019-2725 bypass pocscan and exp ",
"fork": false,
"created_at": "2019-06-16T06:17:09Z",
"updated_at": "2020-03-17T08:04:13Z",
"updated_at": "2023-07-31T06:26:42Z",
"pushed_at": "2019-06-21T01:44:11Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false,
"created_at": "2019-08-15T11:54:21Z",
"updated_at": "2023-07-21T00:09:00Z",
"updated_at": "2023-07-31T12:41:47Z",
"pushed_at": "2022-04-04T15:16:08Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 11
}

View file

@ -73,7 +73,7 @@
"description": "CVE-2020-0096-StrandHogg2 复现",
"fork": false,
"created_at": "2020-09-07T10:25:25Z",
"updated_at": "2022-08-02T06:09:45Z",
"updated_at": "2023-07-31T12:57:57Z",
"pushed_at": "2021-03-15T11:14:18Z",
"stargazers_count": 8,
"watchers_count": 8,

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-07-31T03:15:54Z",
"updated_at": "2023-07-31T07:21:16Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3824,
"watchers_count": 3824,
"stargazers_count": 3825,
"watchers_count": 3825,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1085,
"watchers": 3824,
"watchers": 3825,
"score": 0,
"subscribers_count": 154
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-07-25T13:53:30Z",
"updated_at": "2023-07-31T10:48:49Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1057,
"watchers_count": 1057,
"stargazers_count": 1059,
"watchers_count": 1059,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1057,
"watchers": 1059,
"score": 0,
"subscribers_count": 37
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 95,
"score": 0,
"subscribers_count": 6

View file

@ -13,10 +13,10 @@
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
"fork": false,
"created_at": "2021-01-15T17:32:24Z",
"updated_at": "2023-06-06T04:28:49Z",
"updated_at": "2023-07-31T13:04:15Z",
"pushed_at": "2021-01-23T01:25:22Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 130,
"watchers": 131,
"score": 0,
"subscribers_count": 10
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-31T03:28:34Z",
"updated_at": "2023-07-31T09:07:46Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 991,
"watchers_count": 991,
"stargazers_count": 993,
"watchers_count": 993,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 129,
"watchers": 991,
"watchers": 993,
"score": 0,
"subscribers_count": 9
}

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-07-25T13:53:30Z",
"updated_at": "2023-07-31T10:48:49Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1057,
"watchers_count": 1057,
"stargazers_count": 1059,
"watchers_count": 1059,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1057,
"watchers": 1059,
"score": 0,
"subscribers_count": 37
},

View file

@ -138,7 +138,7 @@
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -148,7 +148,7 @@
"security"
],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 63,
"score": 0,
"subscribers_count": 3
@ -197,19 +197,19 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2023-07-27T07:46:32Z",
"updated_at": "2023-07-31T07:24:50Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 60,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 121,
"forks": 61,
"watchers": 120,
"score": 0,
"subscribers_count": 1
},

View file

@ -470,7 +470,7 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-07-11T06:34:04Z",
"updated_at": "2023-07-31T14:08:40Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 887,
"watchers_count": 887,
@ -1074,19 +1074,19 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2023-07-14T06:20:43Z",
"updated_at": "2023-07-31T12:57:37Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 611,
"watchers_count": 611,
"stargazers_count": 613,
"watchers_count": 613,
"has_discussions": false,
"forks_count": 160,
"forks_count": 161,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 160,
"watchers": 611,
"forks": 161,
"watchers": 613,
"score": 0,
"subscribers_count": 10
},

View file

@ -79,10 +79,10 @@
"description": "a reliable C based exploit and writeup for CVE-2021-3560.",
"fork": false,
"created_at": "2021-06-12T05:22:35Z",
"updated_at": "2023-03-10T12:10:08Z",
"updated_at": "2023-07-31T07:38:51Z",
"pushed_at": "2021-06-23T11:07:32Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 3
},
@ -142,10 +142,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2023-07-25T16:42:39Z",
"updated_at": "2023-07-31T07:30:30Z",
"pushed_at": "2022-11-16T13:14:56Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 2
},

View file

@ -878,7 +878,7 @@
"description": "PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.",
"fork": false,
"created_at": "2022-01-26T13:34:01Z",
"updated_at": "2023-01-26T17:02:31Z",
"updated_at": "2023-07-31T14:14:50Z",
"pushed_at": "2022-01-26T20:17:11Z",
"stargazers_count": 26,
"watchers_count": 26,

View file

@ -2458,10 +2458,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2023-07-25T23:36:35Z",
"updated_at": "2023-07-31T08:35:16Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -2479,7 +2479,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 exploits in powershell",
"fork": false,
"created_at": "2022-04-01T09:10:14Z",
"updated_at": "2023-06-24T12:15:04Z",
"updated_at": "2023-07-31T07:27:56Z",
"pushed_at": "2022-04-04T08:33:41Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2023-07-28T15:56:14Z",
"updated_at": "2023-07-31T14:03:52Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 903,
"watchers_count": 903,
"stargazers_count": 904,
"watchers_count": 904,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@ -889,7 +889,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 903,
"watchers": 904,
"score": 0,
"subscribers_count": 23
},
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-07-31T00:04:24Z",
"updated_at": "2023-07-31T12:27:04Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1626,
"watchers_count": 1626,
"stargazers_count": 1625,
"watchers_count": 1625,
"has_discussions": false,
"forks_count": 475,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 475,
"watchers": 1626,
"watchers": 1625,
"score": 0,
"subscribers_count": 25
},
@ -6739,10 +6739,10 @@
"description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
"fork": false,
"created_at": "2021-12-15T12:07:05Z",
"updated_at": "2023-07-21T16:07:31Z",
"updated_at": "2023-07-31T12:42:35Z",
"pushed_at": "2021-12-17T07:41:47Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -6751,7 +6751,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 3
},

View file

@ -138,13 +138,13 @@
"stargazers_count": 1042,
"watchers_count": 1042,
"has_discussions": false,
"forks_count": 221,
"forks_count": 220,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 221,
"forks": 220,
"watchers": 1042,
"score": 0,
"subscribers_count": 17

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-31T03:28:34Z",
"updated_at": "2023-07-31T09:07:46Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 991,
"watchers_count": 991,
"stargazers_count": 993,
"watchers_count": 993,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 129,
"watchers": 991,
"watchers": 993,
"score": 0,
"subscribers_count": 9
},

View file

@ -605,10 +605,10 @@
"description": "CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.",
"fork": false,
"created_at": "2023-03-18T11:43:00Z",
"updated_at": "2023-07-21T22:04:46Z",
"updated_at": "2023-07-31T09:03:43Z",
"pushed_at": "2023-03-18T11:47:55Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -617,7 +617,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-28T17:42:33Z",
"updated_at": "2023-07-28T23:24:12Z",
"updated_at": "2023-07-31T13:54:59Z",
"pushed_at": "2023-07-28T17:54:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -232,7 +232,7 @@
"description": "😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.",
"fork": false,
"created_at": "2022-04-24T18:25:26Z",
"updated_at": "2023-07-20T00:16:47Z",
"updated_at": "2023-07-31T14:14:33Z",
"pushed_at": "2023-05-23T03:42:31Z",
"stargazers_count": 28,
"watchers_count": 28,

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2023-06-24T07:29:23Z",
"updated_at": "2023-07-31T07:39:51Z",
"pushed_at": "2023-02-25T08:52:03Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 265,
"watchers": 266,
"score": 0,
"subscribers_count": 10
},

View file

@ -197,10 +197,10 @@
"description": "An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products",
"fork": false,
"created_at": "2023-06-21T21:22:35Z",
"updated_at": "2023-07-30T19:06:22Z",
"updated_at": "2023-07-31T14:29:46Z",
"pushed_at": "2023-06-21T21:24:52Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -209,7 +209,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
"fork": false,
"created_at": "2023-01-17T21:26:28Z",
"updated_at": "2023-07-09T16:33:05Z",
"updated_at": "2023-07-31T09:18:21Z",
"pushed_at": "2023-01-19T13:10:07Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 115,
"forks": 29,
"watchers": 116,
"score": 0,
"subscribers_count": 5
},

View file

@ -28,35 +28,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 598766898,
"name": "CVE-2023-0045",
"full_name": "es0j\/CVE-2023-0045",
"owner": {
"login": "es0j",
"id": 37257235,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37257235?v=4",
"html_url": "https:\/\/github.com\/es0j"
},
"html_url": "https:\/\/github.com\/es0j\/CVE-2023-0045",
"description": null,
"fork": false,
"created_at": "2023-02-07T19:12:41Z",
"updated_at": "2023-07-24T02:50:42Z",
"pushed_at": "2023-02-07T19:15:48Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-0386在ubuntu22.04上的提权",
"fork": false,
"created_at": "2023-05-05T03:02:13Z",
"updated_at": "2023-07-28T18:10:12Z",
"updated_at": "2023-07-31T07:02:48Z",
"pushed_at": "2023-06-13T08:58:53Z",
"stargazers_count": 348,
"watchers_count": 348,
"stargazers_count": 349,
"watchers_count": 349,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 348,
"watchers": 349,
"score": 0,
"subscribers_count": 4
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 421,
"watchers_count": 421,
"has_discussions": false,
"forks_count": 163,
"forks_count": 164,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 163,
"forks": 164,
"watchers": 421,
"score": 0,
"subscribers_count": 14

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-07-26T20:03:11Z",
"updated_at": "2023-07-27T15:54:03Z",
"pushed_at": "2023-07-27T11:51:49Z",
"pushed_at": "2023-07-31T09:21:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -18,7 +18,7 @@
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"cve-2023-20887"
],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 209,
"score": 0,
"subscribers_count": 4

View file

@ -73,10 +73,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2023-07-29T19:53:10Z",
"updated_at": "2023-07-31T13:41:02Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 128,
"watchers": 127,
"score": 0,
"subscribers_count": 3
},

View file

@ -1,34 +1,4 @@
[
{
"id": 597984195,
"name": "CVE-2023-23333",
"full_name": "Timorlover\/CVE-2023-23333",
"owner": {
"login": "Timorlover",
"id": 116296194,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116296194?v=4",
"html_url": "https:\/\/github.com\/Timorlover"
},
"html_url": "https:\/\/github.com\/Timorlover\/CVE-2023-23333",
"description": "There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.",
"fork": false,
"created_at": "2023-02-06T06:20:40Z",
"updated_at": "2023-07-13T20:44:04Z",
"pushed_at": "2023-02-06T06:35:29Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 654621817,
"name": "CVE-2023-23333",

View file

@ -159,36 +159,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 599394994,
"name": "KeePass-TriggerLess",
"full_name": "digital-dev\/KeePass-TriggerLess",
"owner": {
"login": "digital-dev",
"id": 18492599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18492599?v=4",
"html_url": "https:\/\/github.com\/digital-dev"
},
"html_url": "https:\/\/github.com\/digital-dev\/KeePass-TriggerLess",
"description": "KeePass 2.53.1 with removed ECAS Trigger System Remediating CVE-2023-24055",
"fork": false,
"created_at": "2023-02-09T03:22:25Z",
"updated_at": "2023-02-09T03:23:48Z",
"pushed_at": "2023-02-09T21:49:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 601458156,
"name": "KeePass-CVE-2023-24055",

View file

@ -148,5 +148,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 672880378,
"name": "CVE-2023-24488",
"full_name": "LazyySec\/CVE-2023-24488",
"owner": {
"login": "LazyySec",
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
"html_url": "https:\/\/github.com\/LazyySec"
},
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-24488",
"description": null,
"fork": false,
"created_at": "2023-07-31T11:29:16Z",
"updated_at": "2023-07-31T11:31:06Z",
"pushed_at": "2023-07-31T11:37:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,12 +43,12 @@
"description": "CVE-2023-24489 PoC & Exploiter",
"fork": false,
"created_at": "2023-07-26T03:19:20Z",
"updated_at": "2023-07-31T05:51:58Z",
"updated_at": "2023-07-31T06:51:56Z",
"pushed_at": "2023-07-26T03:24:22Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -66,8 +66,8 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 5,
"watchers": 9,
"forks": 6,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -1,34 +1,4 @@
[
{
"id": 598673740,
"name": "jfrog-CVE-2023-25136-OpenSSH_Double-Free",
"full_name": "jfrog\/jfrog-CVE-2023-25136-OpenSSH_Double-Free",
"owner": {
"login": "jfrog",
"id": 499942,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499942?v=4",
"html_url": "https:\/\/github.com\/jfrog"
},
"html_url": "https:\/\/github.com\/jfrog\/jfrog-CVE-2023-25136-OpenSSH_Double-Free",
"description": null,
"fork": false,
"created_at": "2023-02-07T15:33:41Z",
"updated_at": "2023-07-24T09:21:55Z",
"pushed_at": "2023-02-09T09:06:15Z",
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 42,
"score": 0,
"subscribers_count": 4
},
{
"id": 601784074,
"name": "CVE-2023-25136",

View file

@ -1,32 +0,0 @@
[
{
"id": 599535214,
"name": "CVE-2023-25194",
"full_name": "ohnonoyesyes\/CVE-2023-25194",
"owner": {
"login": "ohnonoyesyes",
"id": 93457304,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4",
"html_url": "https:\/\/github.com\/ohnonoyesyes"
},
"html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2023-25194",
"description": null,
"fork": false,
"created_at": "2023-02-09T10:49:46Z",
"updated_at": "2023-07-07T19:12:23Z",
"pushed_at": "2023-02-09T11:00:26Z",
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 92,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2023-06-20T03:02:10Z",
"updated_at": "2023-07-31T14:18:20Z",
"pushed_at": "2023-03-20T12:51:29Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 160,
"watchers": 161,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
"fork": false,
"created_at": "2023-04-25T04:59:05Z",
"updated_at": "2023-07-31T01:42:09Z",
"updated_at": "2023-07-31T07:23:24Z",
"pushed_at": "2023-04-30T17:45:27Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,19 +13,19 @@
"description": "WooCommerce Payments: Unauthorized Admin Access Exploit",
"fork": false,
"created_at": "2023-03-30T23:50:39Z",
"updated_at": "2023-07-30T23:44:51Z",
"updated_at": "2023-07-31T07:21:58Z",
"pushed_at": "2023-05-31T13:21:43Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 35,
"forks": 14,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-28T03:06:10Z",
"updated_at": "2023-07-31T01:23:09Z",
"updated_at": "2023-07-31T13:31:30Z",
"pushed_at": "2023-07-28T03:06:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-07-31T02:24:39Z",
"updated_at": "2023-07-31T13:58:41Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 339,
"watchers_count": 339,
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 339,
"watchers": 346,
"score": 0,
"subscribers_count": 16
}

View file

@ -43,10 +43,10 @@
"description": "DoS against Belkin smart plugs via crafted firmware injection",
"fork": false,
"created_at": "2023-07-29T01:11:34Z",
"updated_at": "2023-07-29T01:15:29Z",
"updated_at": "2023-07-31T13:30:50Z",
"pushed_at": "2023-07-29T01:15:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -167,10 +167,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-24T20:51:15Z",
"updated_at": "2023-07-27T21:21:14Z",
"updated_at": "2023-07-31T10:11:36Z",
"pushed_at": "2023-07-24T23:14:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -179,7 +179,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
"fork": false,
"created_at": "2023-07-29T05:06:27Z",
"updated_at": "2023-07-31T05:55:46Z",
"updated_at": "2023-07-31T14:17:50Z",
"pushed_at": "2023-07-29T16:58:16Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 13,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 48,
"forks": 15,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},
@ -61,19 +61,19 @@
},
{
"id": 672719149,
"name": "CVE-2023-35078-Poc-Exploit",
"full_name": "LazyySec\/CVE-2023-35078-Poc-Exploit",
"name": "CVE-2023-35078",
"full_name": "LazyySec\/CVE-2023-35078",
"owner": {
"login": "LazyySec",
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
"html_url": "https:\/\/github.com\/LazyySec"
},
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-35078-Poc-Exploit",
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-35078",
"description": "This tool is built in golang language to exploit CVE-2023-35078 vulnerability inspired by similar tool in python language https:\/\/github.com\/vchan-in\/CVE-2023-35078-Exploit-POC",
"fork": false,
"created_at": "2023-07-31T02:24:24Z",
"updated_at": "2023-07-31T05:45:03Z",
"updated_at": "2023-07-31T07:26:13Z",
"pushed_at": "2023-07-31T02:42:54Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -47,10 +47,10 @@
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
"updated_at": "2023-07-31T04:17:57Z",
"updated_at": "2023-07-31T09:54:21Z",
"pushed_at": "2023-07-23T03:54:44Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Cloudpanel 0-day Exploit",
"fork": false,
"created_at": "2023-06-08T09:20:22Z",
"updated_at": "2023-07-30T21:11:04Z",
"updated_at": "2023-07-31T08:02:48Z",
"pushed_at": "2023-07-24T01:43:17Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 37,
"watchers": 39,
"score": 0,
"subscribers_count": 1
}

View file

@ -236,13 +236,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Apache RocketMQ Arbitrary File Write Vulnerability Exploit",
"fork": false,
"created_at": "2023-07-14T12:22:45Z",
"updated_at": "2023-07-28T01:38:15Z",
"updated_at": "2023-07-31T08:26:43Z",
"pushed_at": "2023-07-19T02:29:39Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-37847漏洞证明",
"fork": false,
"created_at": "2023-07-27T02:12:57Z",
"updated_at": "2023-07-28T13:49:25Z",
"updated_at": "2023-07-31T09:18:56Z",
"pushed_at": "2023-07-27T02:18:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,7 +13,7 @@
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2023-07-21T01:53:10Z",
"updated_at": "2023-07-27T09:53:38Z",
"updated_at": "2023-07-31T12:46:12Z",
"pushed_at": "2023-07-25T22:16:44Z",
"stargazers_count": 47,
"watchers_count": 47,

View file

@ -60,34 +60,34 @@
"subscribers_count": 1
},
{
"id": 671910678,
"name": "CVE-2023-38646",
"full_name": "Zenmovie\/CVE-2023-38646",
"id": 671922179,
"name": "CVE-2023-38646-hmoje",
"full_name": "hheeyywweellccoommee\/CVE-2023-38646-hmoje",
"owner": {
"login": "Zenmovie",
"id": 98185655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98185655?v=4",
"html_url": "https:\/\/github.com\/Zenmovie"
"login": "hheeyywweellccoommee",
"id": 131327252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131327252?v=4",
"html_url": "https:\/\/github.com\/hheeyywweellccoommee"
},
"html_url": "https:\/\/github.com\/Zenmovie\/CVE-2023-38646",
"html_url": "https:\/\/github.com\/hheeyywweellccoommee\/CVE-2023-38646-hmoje",
"description": "Proof of Concept for CVE-2023-38646",
"fork": false,
"created_at": "2023-07-28T12:29:16Z",
"updated_at": "2023-07-30T01:31:51Z",
"created_at": "2023-07-28T13:01:16Z",
"updated_at": "2023-07-31T10:59:26Z",
"pushed_at": "2023-07-28T12:31:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 671965825,
@ -133,7 +133,7 @@
"description": "Metabase Pre-auth RCE (CVE-2023-38646)!!",
"fork": false,
"created_at": "2023-07-29T13:07:00Z",
"updated_at": "2023-07-31T03:14:46Z",
"updated_at": "2023-07-31T10:12:15Z",
"pushed_at": "2023-07-29T14:02:24Z",
"stargazers_count": 4,
"watchers_count": 4,
@ -143,10 +143,11 @@
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"cve",
"cve-2023-38646",
"exploit",
"metabase"
"metabase",
"zeroday"
],
"visibility": "public",
"forks": 1,
@ -246,20 +247,50 @@
},
{
"id": 672759334,
"name": "Poc-Metabase-Preauth-CVE-2023-38646",
"full_name": "LazyySec\/Poc-Metabase-Preauth-CVE-2023-38646",
"name": "CVE-2023-38646",
"full_name": "LazyySec\/CVE-2023-38646",
"owner": {
"login": "LazyySec",
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
"html_url": "https:\/\/github.com\/LazyySec"
},
"html_url": "https:\/\/github.com\/LazyySec\/Poc-Metabase-Preauth-CVE-2023-38646",
"html_url": "https:\/\/github.com\/LazyySec\/CVE-2023-38646",
"description": null,
"fork": false,
"created_at": "2023-07-31T05:25:37Z",
"updated_at": "2023-07-31T05:26:11Z",
"pushed_at": "2023-07-31T06:07:05Z",
"updated_at": "2023-07-31T07:24:40Z",
"pushed_at": "2023-07-31T07:25:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 672876505,
"name": "CVE-2023-38646",
"full_name": "Zenmovie\/CVE-2023-38646",
"owner": {
"login": "Zenmovie",
"id": 98185655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98185655?v=4",
"html_url": "https:\/\/github.com\/Zenmovie"
},
"html_url": "https:\/\/github.com\/Zenmovie\/CVE-2023-38646",
"description": "Proof of Concept for CVE-2023-38646",
"fork": false,
"created_at": "2023-07-31T11:18:21Z",
"updated_at": "2023-07-31T11:18:21Z",
"pushed_at": "2023-07-31T11:20:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -7,7 +7,6 @@
</code>
- [ASkyeye/CVE-2023-0045](https://github.com/ASkyeye/CVE-2023-0045)
- [es0j/CVE-2023-0045](https://github.com/es0j/CVE-2023-0045)
### CVE-2023-0050 (2023-03-09)
@ -763,7 +762,6 @@
<code>There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
</code>
- [Timorlover/CVE-2023-23333](https://github.com/Timorlover/CVE-2023-23333)
- [Mr-xn/CVE-2023-23333](https://github.com/Mr-xn/CVE-2023-23333)
- [WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333](https://github.com/WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333)
@ -876,7 +874,6 @@
- [Cyb3rtus/keepass_CVE-2023-24055_yara_rule](https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule)
- [ATTACKnDEFEND/CVE-2023-24055](https://github.com/ATTACKnDEFEND/CVE-2023-24055)
- [julesbozouklian/PoC_CVE-2023-24055](https://github.com/julesbozouklian/PoC_CVE-2023-24055)
- [digital-dev/KeePass-TriggerLess](https://github.com/digital-dev/KeePass-TriggerLess)
- [zwlsix/KeePass-CVE-2023-24055](https://github.com/zwlsix/KeePass-CVE-2023-24055)
### CVE-2023-24059 (2023-01-22)
@ -914,6 +911,7 @@
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
- [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488)
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
- [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
### CVE-2023-24489 (2023-07-10)
@ -959,7 +957,6 @@
<code>OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states &quot;remote code execution is theoretically possible.&quot;
</code>
- [jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free](https://github.com/jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free)
- [ticofookfook/CVE-2023-25136](https://github.com/ticofookfook/CVE-2023-25136)
- [Christbowel/CVE-2023-25136](https://github.com/Christbowel/CVE-2023-25136)
- [adhikara13/CVE-2023-25136](https://github.com/adhikara13/CVE-2023-25136)
@ -979,13 +976,6 @@
- [7imbitz/CVE-2023-25157-checker](https://github.com/7imbitz/CVE-2023-25157-checker)
- [EmmanuelCruzL/CVE-2023-25157](https://github.com/EmmanuelCruzL/CVE-2023-25157)
### CVE-2023-25194 (2023-02-07)
<code>A possible security vulnerability has been identified in Apache Kafka Connect API.\nThis requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config\nand a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0.\nWhen configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config`\nproperty for any of the connector's Kafka clients to &quot;com.sun.security.auth.module.JndiLoginModule&quot;, which can be done via the\n`producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties.\nThis will allow the server to connect to the attacker's LDAP server\nand deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server.\nAttacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.\n\nSince Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box\nconfigurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector\nclient override policy that permits them.\n\nSince Apache Kafka 3.4.0, we have added a system property (&quot;-Dorg.apache.kafka.disallowed.login.modules&quot;) to disable the problematic login modules usage\nin SASL JAAS configuration. Also by default &quot;com.sun.security.auth.module.JndiLoginModule&quot; is disabled in Apache Kafka Connect 3.4.0. \n\nWe advise the Kafka Connect users to validate connector configurations and only allow trusted JNDI configurations. Also examine connector dependencies for \nvulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally,\nin addition to leveraging the &quot;org.apache.kafka.disallowed.login.modules&quot; system property, Kafka Connect users can also implement their own connector\nclient config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.\n
</code>
- [ohnonoyesyes/CVE-2023-25194](https://github.com/ohnonoyesyes/CVE-2023-25194)
### CVE-2023-25234 (2023-02-27)
<code>Tenda AC500 V2.0.1.9(1307) is vulnerable to Buffer Overflow in function fromAddressNat via parameters entrys and mitInterface.
@ -2289,7 +2279,7 @@
- [vchan-in/CVE-2023-35078-Exploit-POC](https://github.com/vchan-in/CVE-2023-35078-Exploit-POC)
- [lager1/CVE-2023-35078](https://github.com/lager1/CVE-2023-35078)
- [LazyySec/CVE-2023-35078-Poc-Exploit](https://github.com/LazyySec/CVE-2023-35078-Poc-Exploit)
- [LazyySec/CVE-2023-35078](https://github.com/LazyySec/CVE-2023-35078)
### CVE-2023-35086 (2023-07-21)
@ -2530,13 +2520,14 @@
- [adriyansyah-mf/CVE-2023-38646--Metabase-](https://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-)
- [Pumpkin-Garden/POC_Metabase_CVE-2023-38646](https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646)
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
- [hheeyywweellccoommee/CVE-2023-38646-hmoje](https://github.com/hheeyywweellccoommee/CVE-2023-38646-hmoje)
- [hheeyywweellccoommee/CVE-2023-38646-suynl](https://github.com/hheeyywweellccoommee/CVE-2023-38646-suynl)
- [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646)
- [hheeyywweellccoommee/CVE-2023-38646-glwax](https://github.com/hheeyywweellccoommee/CVE-2023-38646-glwax)
- [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc)
- [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646)
- [LazyySec/Poc-Metabase-Preauth-CVE-2023-38646](https://github.com/LazyySec/Poc-Metabase-Preauth-CVE-2023-38646)
- [LazyySec/CVE-2023-38646](https://github.com/LazyySec/CVE-2023-38646)
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
### CVE-2023-39144
- [cduram/CVE-2023-39144](https://github.com/cduram/CVE-2023-39144)
@ -27084,6 +27075,13 @@
- [lanrat/tethr](https://github.com/lanrat/tethr)
### CVE-2017-0564 (2017-04-07)
<code>An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203.
</code>
- [guoygang/CVE-2017-0564-ION-PoC](https://github.com/guoygang/CVE-2017-0564-ION-PoC)
### CVE-2017-0781 (2017-09-14)
<code>A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
@ -27106,6 +27104,7 @@
- [Alfa100001/-CVE-2017-0785-BlueBorne-PoC](https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC)
- [Hackerscript/BlueBorne-CVE-2017-0785](https://github.com/Hackerscript/BlueBorne-CVE-2017-0785)
- [pieterbork/blueborne](https://github.com/pieterbork/blueborne)
- [sigbitsadmin/diff](https://github.com/sigbitsadmin/diff)
- [RavSS/Bluetooth-Crash-CVE-2017-0785](https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785)
- [sh4rknado/BlueBorn](https://github.com/sh4rknado/BlueBorn)
- [Joanmei/CVE-2017-0785](https://github.com/Joanmei/CVE-2017-0785)
@ -27118,6 +27117,13 @@
- [michalbednarski/ReparcelBug](https://github.com/michalbednarski/ReparcelBug)
### CVE-2017-0807 (2017-10-03)
<code>An elevation of privilege vulnerability in the Android framework (ui framework). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-35056974.
</code>
- [kpatsakis/PoC_CVE-2017-0807](https://github.com/kpatsakis/PoC_CVE-2017-0807)
### CVE-2017-1635 (2017-12-13)
<code>IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free error. A remote attacker could exploit this vulnerability to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 133243.
@ -27412,6 +27418,7 @@
- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
- [pr0x1ma-byte/cybersecurity-struts2](https://github.com/pr0x1ma-byte/cybersecurity-struts2)
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
- [0x00-0x00/CVE-2017-5638](https://github.com/0x00-0x00/CVE-2017-5638)
- [m3ssap0/struts2_cve-2017-5638](https://github.com/m3ssap0/struts2_cve-2017-5638)
- [Greynad/struts2-jakarta-inject](https://github.com/Greynad/struts2-jakarta-inject)
@ -27469,8 +27476,10 @@
<code>Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
</code>
- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
### CVE-2017-5721 (2017-10-10)
@ -27484,6 +27493,12 @@
<code>Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
</code>
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
### CVE-2017-5754 (2018-01-04)
@ -27494,7 +27509,9 @@
- [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck)
- [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown)
- [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown)
- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown)
- [zzado/Meltdown](https://github.com/zzado/Meltdown)
- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner)
### CVE-2017-5792 (2018-02-15)
@ -27580,6 +27597,7 @@
<code>The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697.
</code>
- [GarnetSunset/CiscoSpectreTakeover](https://github.com/GarnetSunset/CiscoSpectreTakeover)
- [GarnetSunset/CiscoIOSSNMPToolkit](https://github.com/GarnetSunset/CiscoIOSSNMPToolkit)
### CVE-2017-6913 (2018-09-18)
@ -27634,6 +27652,14 @@
- [bazad/sysctl_coalition_get_pid_list-dos](https://github.com/bazad/sysctl_coalition_get_pid_list-dos)
### CVE-2017-7184 (2017-03-19)
<code>The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.
</code>
- [rockl/cve-2017-7184](https://github.com/rockl/cve-2017-7184)
- [rockl/cve-2017-7184-bak](https://github.com/rockl/cve-2017-7184-bak)
### CVE-2017-7188 (2017-04-14)
<code>Zurmo 3.1.1 Stable allows a Cross-Site Scripting (XSS) attack with a base64-encoded SCRIPT element within a data: URL in the returnUrl parameter to default/toggleCollapse.
@ -27657,6 +27683,7 @@
- [homjxi0e/cve-2017-7269](https://github.com/homjxi0e/cve-2017-7269)
- [xiaovpn/CVE-2017-7269](https://github.com/xiaovpn/CVE-2017-7269)
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
@ -27888,6 +27915,7 @@
</code>
- [temesgeny/ppsx-file-generator](https://github.com/temesgeny/ppsx-file-generator)
- [rxwx/CVE-2017-8570](https://github.com/rxwx/CVE-2017-8570)
- [MaxSecurity/Office-CVE-2017-8570](https://github.com/MaxSecurity/Office-CVE-2017-8570)
- [SwordSheath/CVE-2017-8570](https://github.com/SwordSheath/CVE-2017-8570)
- [Drac0nids/CVE-2017-8570](https://github.com/Drac0nids/CVE-2017-8570)
@ -27945,6 +27973,13 @@
- [drbothen/GO-RPCBOMB](https://github.com/drbothen/GO-RPCBOMB)
### CVE-2017-8802 (2018-01-16)
<code>Cross-site scripting (XSS) vulnerability in Zimbra Collaboration Suite (aka ZCS) before 8.8.0 Beta2 might allow remote attackers to inject arbitrary web script or HTML via vectors related to the &quot;Show Snippet&quot; functionality.
</code>
- [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx)
### CVE-2017-8809 (2017-11-15)
<code>api.php in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has a Reflected File Download vulnerability.
@ -28204,10 +28239,12 @@
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
- [bmcculley/CVE-2017-10271](https://github.com/bmcculley/CVE-2017-10271)
- [peterpeter228/Oracle-WebLogic-CVE-2017-10271](https://github.com/peterpeter228/Oracle-WebLogic-CVE-2017-10271)
- [Cymmetria/weblogic_honeypot](https://github.com/Cymmetria/weblogic_honeypot)
- [JackyTsuuuy/weblogic_wls_rce_poc-exp](https://github.com/JackyTsuuuy/weblogic_wls_rce_poc-exp)
- [R0B1NL1N/Oracle-WebLogic-WLS-WSAT](https://github.com/R0B1NL1N/Oracle-WebLogic-WLS-WSAT)
@ -28255,6 +28292,9 @@
- [GeneBlue/CVE-2017-10661_POC](https://github.com/GeneBlue/CVE-2017-10661_POC)
### CVE-2017-10797
- [n4xh4ck5/CVE-2017-10797](https://github.com/n4xh4ck5/CVE-2017-10797)
### CVE-2017-10952 (2017-08-29)
<code>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the saveAs JavaScript function. The issue results from the lack of proper validation of user-supplied data, which can lead to writing arbitrary files into attacker controlled locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4518.
@ -28365,6 +28405,9 @@
- [CSC-pentest/cve-2017-11882](https://github.com/CSC-pentest/cve-2017-11882)
- [Shadowshusky/CVE-2017-11882-](https://github.com/Shadowshusky/CVE-2017-11882-)
- [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802)
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802)
- [likescam/CVE-2017-11882](https://github.com/likescam/CVE-2017-11882)
- [likescam/CVE-2018-0802_CVE-2017-11882](https://github.com/likescam/CVE-2018-0802_CVE-2017-11882)
- [herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam](https://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam)
- [ChaitanyaHaritash/CVE-2017-11882](https://github.com/ChaitanyaHaritash/CVE-2017-11882)
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
@ -28807,6 +28850,13 @@
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
### CVE-2017-16997 (2017-12-17)
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the &quot;./&quot; directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
</code>
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
### CVE-2017-17058 (2017-11-29)
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have &quot;if (!defined('ABSPATH')) {exit;}&quot; code.
@ -28861,6 +28911,13 @@
- [fssecur3/goahead-rce-exploit](https://github.com/fssecur3/goahead-rce-exploit)
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
### CVE-2017-17692 (2017-12-21)
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
</code>
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
### CVE-2017-17736 (2018-03-23)
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
@ -29031,6 +29088,13 @@
- [bindecy/HugeDirtyCowPOC](https://github.com/bindecy/HugeDirtyCowPOC)
### CVE-2017-1000475 (2018-01-24)
<code>FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges.
</code>
- [lajarajorge/CVE-2017-1000475](https://github.com/lajarajorge/CVE-2017-1000475)
### CVE-2017-1000486 (2018-01-03)
<code>Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
@ -31761,7 +31825,7 @@
- [chef-boneyard/bash-shellshock](https://github.com/chef-boneyard/bash-shellshock)
- [gina-alaska/bash-cve-2014-7169-cookbook](https://github.com/gina-alaska/bash-cve-2014-7169-cookbook)
- [prince-stark/SHELL-SCHOCK](https://github.com/prince-stark/SHELL-SCHOCK)
- [Gobinath-B/SHELL-SCHOCK](https://github.com/Gobinath-B/SHELL-SCHOCK)
### CVE-2014-7205 (2014-10-08)