Auto Update 2023/06/23 14:11:25

This commit is contained in:
motikan2010-bot 2023-06-23 23:11:25 +09:00
parent 35abe5b969
commit fa03bab078
53 changed files with 264 additions and 264 deletions

View file

@ -2,14 +2,14 @@
{
"id": 382165102,
"name": "distccd_rce_CVE-2004-2687",
"full_name": "c1ph3rm4st3r\/distccd_rce_CVE-2004-2687",
"full_name": "crypticdante\/distccd_rce_CVE-2004-2687",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/distccd_rce_CVE-2004-2687",
"html_url": "https:\/\/github.com\/crypticdante\/distccd_rce_CVE-2004-2687",
"description": null,
"fork": false,
"created_at": "2021-07-01T21:56:34Z",

View file

@ -692,14 +692,14 @@
{
"id": 557398595,
"name": "CVE-2007-2447",
"full_name": "c1ph3rm4st3r\/CVE-2007-2447",
"full_name": "crypticdante\/CVE-2007-2447",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2007-2447",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2007-2447",
"description": null,
"fork": false,
"created_at": "2022-10-25T16:05:16Z",

View file

@ -32,14 +32,14 @@
{
"id": 386447803,
"name": "CVE-2009-2265",
"full_name": "c1ph3rm4st3r\/CVE-2009-2265",
"full_name": "crypticdante\/CVE-2009-2265",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2009-2265",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2009-2265",
"description": null,
"fork": false,
"created_at": "2021-07-15T23:14:11Z",

View file

@ -32,14 +32,14 @@
{
"id": 384774726,
"name": "CVE-2011-1249",
"full_name": "c1ph3rm4st3r\/CVE-2011-1249",
"full_name": "crypticdante\/CVE-2011-1249",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2011-1249",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2011-1249",
"description": null,
"fork": false,
"created_at": "2021-07-10T19:27:23Z",

View file

@ -1694,14 +1694,14 @@
{
"id": 485013657,
"name": "CVE-2014-0160_Heartbleed",
"full_name": "c1ph3rm4st3r\/CVE-2014-0160_Heartbleed",
"full_name": "crypticdante\/CVE-2014-0160_Heartbleed",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2014-0160_Heartbleed",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2014-0160_Heartbleed",
"description": null,
"fork": false,
"created_at": "2022-04-24T11:53:16Z",

View file

@ -244,14 +244,14 @@
{
"id": 385080605,
"name": "CVE-2015-1635-POC",
"full_name": "c1ph3rm4st3r\/CVE-2015-1635-POC",
"full_name": "crypticdante\/CVE-2015-1635-POC",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2015-1635-POC",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2015-1635-POC",
"description": null,
"fork": false,
"created_at": "2021-07-12T00:23:30Z",
@ -274,14 +274,14 @@
{
"id": 385082908,
"name": "CVE-2015-1635",
"full_name": "c1ph3rm4st3r\/CVE-2015-1635",
"full_name": "crypticdante\/CVE-2015-1635",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2015-1635",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2015-1635",
"description": null,
"fork": false,
"created_at": "2021-07-12T00:37:54Z",

View file

@ -32,14 +32,14 @@
{
"id": 386433999,
"name": "CVE-2015-6668",
"full_name": "c1ph3rm4st3r\/CVE-2015-6668",
"full_name": "crypticdante\/CVE-2015-6668",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2015-6668",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2015-6668",
"description": null,
"fork": false,
"created_at": "2021-07-15T21:58:15Z",

View file

@ -2,14 +2,14 @@
{
"id": 615366361,
"name": "CVE-2016-1531",
"full_name": "c1ph3rm4st3r\/CVE-2016-1531",
"full_name": "crypticdante\/CVE-2016-1531",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2016-1531",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2016-1531",
"description": null,
"fork": false,
"created_at": "2023-03-17T14:30:15Z",

View file

@ -62,14 +62,14 @@
{
"id": 384203070,
"name": "MS17-010_CVE-2017-0143",
"full_name": "c1ph3rm4st3r\/MS17-010_CVE-2017-0143",
"full_name": "crypticdante\/MS17-010_CVE-2017-0143",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/MS17-010_CVE-2017-0143",
"html_url": "https:\/\/github.com\/crypticdante\/MS17-010_CVE-2017-0143",
"description": null,
"fork": false,
"created_at": "2021-07-08T17:35:50Z",

View file

@ -427,14 +427,14 @@
{
"id": 386542444,
"name": "CVE-2017-7269",
"full_name": "c1ph3rm4st3r\/CVE-2017-7269",
"full_name": "crypticdante\/CVE-2017-7269",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2017-7269",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2017-7269",
"description": null,
"fork": false,
"created_at": "2021-07-16T07:02:27Z",

View file

@ -258,10 +258,10 @@
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false,
"created_at": "2021-04-21T16:42:31Z",
"updated_at": "2023-06-16T21:03:58Z",
"updated_at": "2023-06-23T10:25:52Z",
"pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -270,7 +270,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -256,14 +256,14 @@
{
"id": 445751273,
"name": "CVE-2018-16763",
"full_name": "c1ph3rm4st3r\/CVE-2018-16763",
"full_name": "crypticdante\/CVE-2018-16763",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2018-16763",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2018-16763",
"description": null,
"fork": false,
"created_at": "2022-01-08T07:15:24Z",

View file

@ -18,13 +18,13 @@
"stargazers_count": 1764,
"watchers_count": 1764,
"has_discussions": false,
"forks_count": 263,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 263,
"forks": 264,
"watchers": 1764,
"score": 0,
"subscribers_count": 37

View file

@ -641,14 +641,14 @@
{
"id": 377824354,
"name": "CVE-2019-14287",
"full_name": "c1ph3rm4st3r\/CVE-2019-14287",
"full_name": "crypticdante\/CVE-2019-14287",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2019-14287",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2019-14287",
"description": null,
"fork": false,
"created_at": "2021-06-17T12:33:08Z",

View file

@ -275,14 +275,14 @@
{
"id": 387298591,
"name": "CVE-2019-16278",
"full_name": "c1ph3rm4st3r\/CVE-2019-16278",
"full_name": "crypticdante\/CVE-2019-16278",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2019-16278",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2019-16278",
"description": null,
"fork": false,
"created_at": "2021-07-19T00:45:07Z",

View file

@ -667,14 +667,14 @@
{
"id": 384265226,
"name": "CVE-2019-5736",
"full_name": "c1ph3rm4st3r\/CVE-2019-5736",
"full_name": "crypticdante\/CVE-2019-5736",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2019-5736",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2021-07-08T22:46:30Z",

View file

@ -97,14 +97,14 @@
{
"id": 384531590,
"name": "CVE-2019-6447",
"full_name": "c1ph3rm4st3r\/CVE-2019-6447",
"full_name": "crypticdante\/CVE-2019-6447",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2019-6447",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2019-6447",
"description": null,
"fork": false,
"created_at": "2021-07-09T19:21:29Z",

View file

@ -32,14 +32,14 @@
{
"id": 387264720,
"name": "CVE-2019-9053",
"full_name": "c1ph3rm4st3r\/CVE-2019-9053",
"full_name": "crypticdante\/CVE-2019-9053",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2019-9053",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2019-9053",
"description": null,
"fork": false,
"created_at": "2021-07-18T20:37:30Z",

View file

@ -195,10 +195,10 @@
"description": "Identifying and Mitigating the CVE-20200796 flaw in the fly",
"fork": false,
"created_at": "2020-03-11T18:42:32Z",
"updated_at": "2023-02-18T05:29:11Z",
"updated_at": "2023-06-23T07:13:45Z",
"pushed_at": "2020-03-12T10:19:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -212,7 +212,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
@ -1264,10 +1264,10 @@
"description": null,
"fork": false,
"created_at": "2020-04-01T01:46:08Z",
"updated_at": "2023-06-01T07:43:01Z",
"updated_at": "2023-06-23T07:16:13Z",
"pushed_at": "2020-04-01T01:46:17Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -1276,7 +1276,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 5
},
@ -1444,10 +1444,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2023-06-22T07:54:40Z",
"updated_at": "2023-06-23T08:12:20Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"has_discussions": false,
"forks_count": 159,
"allow_forking": true,
@ -1462,7 +1462,7 @@
],
"visibility": "public",
"forks": 159,
"watchers": 491,
"watchers": 492,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2023-06-21T17:30:37Z",
"updated_at": "2023-06-23T10:20:58Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 376,
"watchers_count": 376,
"stargazers_count": 375,
"watchers_count": 375,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 43,
"watchers": 376,
"watchers": 375,
"score": 0,
"subscribers_count": 6
}

View file

@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2023-06-22T02:13:22Z",
"updated_at": "2023-06-23T06:51:54Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 916,
"watchers_count": 916,
"stargazers_count": 917,
"watchers_count": 917,
"has_discussions": false,
"forks_count": 229,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 229,
"watchers": 916,
"watchers": 917,
"score": 0,
"subscribers_count": 25
},
@ -1010,13 +1010,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 9,
"score": 0,
"subscribers_count": 1

View file

@ -897,14 +897,14 @@
{
"id": 452291757,
"name": "CVE-2021-4034",
"full_name": "c1ph3rm4st3r\/CVE-2021-4034",
"full_name": "crypticdante\/CVE-2021-4034",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2021-4034",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-01-26T13:45:17Z",
@ -4670,14 +4670,14 @@
{
"id": 604329826,
"name": "CVE-2021-4034_Python3",
"full_name": "c1ph3rm4st3r\/CVE-2021-4034_Python3",
"full_name": "crypticdante\/CVE-2021-4034_Python3",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2021-4034_Python3",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2021-4034_Python3",
"description": null,
"fork": false,
"created_at": "2023-02-20T20:39:32Z",

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-06-05T04:08:45Z",
"updated_at": "2023-06-05T04:09:44Z",
"updated_at": "2023-06-23T09:50:01Z",
"pushed_at": "2023-06-05T04:11:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-06-21T10:49:43Z",
"updated_at": "2023-06-23T12:16:59Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 600,
"watchers_count": 600,
"stargazers_count": 601,
"watchers_count": 601,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 600,
"watchers": 601,
"score": 0,
"subscribers_count": 11
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 1221,
"watchers_count": 1221,
"has_discussions": false,
"forks_count": 313,
"forks_count": 314,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 313,
"forks": 314,
"watchers": 1221,
"score": 0,
"subscribers_count": 26

View file

@ -6031,13 +6031,13 @@
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 94,
"score": 0,
"subscribers_count": 7

View file

@ -230,19 +230,19 @@
"description": "PoC for CVE-2022-1388_F5_BIG-IP",
"fork": false,
"created_at": "2022-05-09T07:39:55Z",
"updated_at": "2023-05-05T17:30:07Z",
"updated_at": "2023-06-23T10:34:24Z",
"pushed_at": "2022-05-15T02:30:40Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 59,
"forks": 14,
"watchers": 60,
"score": 0,
"subscribers_count": 1
},
@ -410,19 +410,19 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2023-06-02T15:24:54Z",
"updated_at": "2023-06-23T10:06:08Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 232,
"watchers_count": 232,
"stargazers_count": 233,
"watchers_count": 233,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 232,
"forks": 40,
"watchers": 233,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2023-06-23T05:35:37Z",
"updated_at": "2023-06-23T07:55:31Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 218,
"watchers_count": 218,
"stargazers_count": 219,
"watchers_count": 219,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 218,
"watchers": 219,
"score": 0,
"subscribers_count": 8
}

View file

@ -46,19 +46,19 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2023-06-02T15:24:53Z",
"updated_at": "2023-06-23T10:36:16Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"has_discussions": false,
"forks_count": 52,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 285,
"forks": 53,
"watchers": 286,
"score": 0,
"subscribers_count": 5
},
@ -406,10 +406,10 @@
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
"fork": false,
"created_at": "2022-04-13T16:18:56Z",
"updated_at": "2023-05-02T02:00:06Z",
"updated_at": "2023-06-23T11:02:03Z",
"pushed_at": "2022-04-26T04:26:00Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -418,7 +418,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 3
},

View file

@ -133,13 +133,13 @@
"stargazers_count": 296,
"watchers_count": 296,
"has_discussions": false,
"forks_count": 225,
"forks_count": 226,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 225,
"forks": 226,
"watchers": 296,
"score": 0,
"subscribers_count": 9

View file

@ -18,13 +18,13 @@
"stargazers_count": 546,
"watchers_count": 546,
"has_discussions": false,
"forks_count": 93,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 93,
"forks": 94,
"watchers": 546,
"score": 0,
"subscribers_count": 7

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2023-06-23T06:07:29Z",
"updated_at": "2023-06-23T06:25:54Z",
"pushed_at": "2023-03-04T05:52:28Z",
"stargazers_count": 443,
"watchers_count": 443,
"stargazers_count": 444,
"watchers_count": 444,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 443,
"watchers": 444,
"score": 0,
"subscribers_count": 51
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 49,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"forks": 50,
"watchers": 96,
"score": 0,
"subscribers_count": 2

View file

@ -256,14 +256,14 @@
{
"id": 485156953,
"name": "CVE-2022-29464",
"full_name": "c1ph3rm4st3r\/CVE-2022-29464",
"full_name": "crypticdante\/CVE-2022-29464",
"owner": {
"login": "c1ph3rm4st3r",
"login": "crypticdante",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c1ph3rm4st3r"
"html_url": "https:\/\/github.com\/crypticdante"
},
"html_url": "https:\/\/github.com\/c1ph3rm4st3r\/CVE-2022-29464",
"html_url": "https:\/\/github.com\/crypticdante\/CVE-2022-29464",
"description": null,
"fork": false,
"created_at": "2022-04-24T22:40:38Z",

View file

@ -78,19 +78,19 @@
"description": "Zyxel 防火墙远程命令注入漏洞CVE-2022-30525批量检测脚本",
"fork": false,
"created_at": "2022-05-13T12:58:43Z",
"updated_at": "2023-05-05T17:30:11Z",
"updated_at": "2023-06-23T10:33:27Z",
"pushed_at": "2022-05-13T14:46:04Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 33,
"forks": 10,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-06-20T11:38:35Z",
"updated_at": "2023-06-23T12:05:15Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 809,
"watchers_count": 809,
"stargazers_count": 810,
"watchers_count": 810,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 809,
"watchers": 810,
"score": 0,
"subscribers_count": 25
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-06-18T12:22:57Z",
"updated_at": "2023-06-23T04:01:04Z",
"updated_at": "2023-06-23T12:00:32Z",
"pushed_at": "2023-06-18T12:41:52Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 48,
"forks": 11,
"watchers": 51,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
"fork": false,
"created_at": "2023-06-13T13:17:23Z",
"updated_at": "2023-06-22T14:09:17Z",
"updated_at": "2023-06-23T13:50:55Z",
"pushed_at": "2023-06-13T14:39:17Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 180,
"watchers_count": 180,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 178,
"watchers": 180,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-06-21T07:00:40Z",
"updated_at": "2023-06-23T09:44:14Z",
"pushed_at": "2023-04-23T17:54:49Z",
"stargazers_count": 579,
"watchers_count": 579,
"stargazers_count": 580,
"watchers_count": 580,
"has_discussions": false,
"forks_count": 94,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 579,
"watchers": 580,
"score": 0,
"subscribers_count": 6
},

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-06-22T08:21:33Z",
"updated_at": "2023-06-23T13:55:14Z",
"pushed_at": "2023-06-03T19:35:51Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 120,
"watchers": 123,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-04-21T16:22:10Z",
"updated_at": "2023-05-30T13:33:40Z",
"pushed_at": "2023-04-21T16:44:56Z",
"pushed_at": "2023-06-23T10:50:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -73,19 +73,19 @@
"description": "Python 2.7",
"fork": false,
"created_at": "2023-06-06T02:59:22Z",
"updated_at": "2023-06-06T03:03:03Z",
"updated_at": "2023-06-23T08:59:56Z",
"pushed_at": "2023-06-13T22:16:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -167,19 +167,19 @@
"description": "Python 2.7",
"fork": false,
"created_at": "2023-06-13T22:13:24Z",
"updated_at": "2023-06-13T22:17:45Z",
"updated_at": "2023-06-23T08:59:44Z",
"pushed_at": "2023-06-13T22:25:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 63,
"score": 0,
"subscribers_count": 7

View file

@ -103,10 +103,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2023-06-23T05:48:55Z",
"updated_at": "2023-06-23T10:41:21Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-14T09:23:34Z",
"updated_at": "2023-06-22T19:53:04Z",
"updated_at": "2023-06-23T11:54:55Z",
"pushed_at": "2023-06-14T09:27:49Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-06-19T12:57:43Z",
"updated_at": "2023-06-19T12:57:44Z",
"pushed_at": "2023-06-20T07:50:14Z",
"pushed_at": "2023-06-23T12:18:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-18T11:14:08Z",
"updated_at": "2023-06-23T02:58:28Z",
"updated_at": "2023-06-23T12:31:58Z",
"pushed_at": "2023-06-18T11:51:54Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 4
}

View file

@ -43,19 +43,19 @@
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
"fork": false,
"created_at": "2023-05-16T03:06:40Z",
"updated_at": "2023-06-19T02:50:52Z",
"updated_at": "2023-06-23T11:27:55Z",
"pushed_at": "2023-05-16T04:34:16Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 251,
"watchers_count": 251,
"has_discussions": false,
"forks_count": 62,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 249,
"forks": 63,
"watchers": 251,
"score": 0,
"subscribers_count": 4
},
@ -73,10 +73,10 @@
"description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233",
"fork": false,
"created_at": "2023-05-16T05:58:03Z",
"updated_at": "2023-06-15T17:33:36Z",
"updated_at": "2023-06-23T09:35:56Z",
"pushed_at": "2023-06-20T06:58:04Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,12 +13,12 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-06-17T06:27:36Z",
"updated_at": "2023-06-23T11:31:37Z",
"pushed_at": "2023-06-03T23:23:11Z",
"stargazers_count": 473,
"watchers_count": 473,
"stargazers_count": 474,
"watchers_count": 474,
"has_discussions": false,
"forks_count": 41,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"keepass"
],
"visibility": "public",
"forks": 41,
"watchers": 473,
"forks": 42,
"watchers": 474,
"score": 0,
"subscribers_count": 10
},

View file

@ -73,19 +73,19 @@
"description": "MOVEit CVE-2023-34362",
"fork": false,
"created_at": "2023-06-09T19:07:32Z",
"updated_at": "2023-06-21T19:09:13Z",
"updated_at": "2023-06-23T10:06:58Z",
"pushed_at": "2023-06-12T11:29:46Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 79,
"forks": 21,
"watchers": 82,
"score": 0,
"subscribers_count": 5
},
@ -103,10 +103,10 @@
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
"fork": false,
"created_at": "2023-06-12T12:56:12Z",
"updated_at": "2023-06-21T03:11:24Z",
"updated_at": "2023-06-23T10:46:57Z",
"pushed_at": "2023-06-13T08:46:03Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34960 Chamilo PoC",
"fork": false,
"created_at": "2023-06-09T10:32:22Z",
"updated_at": "2023-06-20T05:48:19Z",
"updated_at": "2023-06-23T07:47:22Z",
"pushed_at": "2023-06-09T10:33:47Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 2
}

View file

@ -5012,7 +5012,7 @@
- [gpiechnik2/nmap-CVE-2022-29464](https://github.com/gpiechnik2/nmap-CVE-2022-29464)
- [0xAgun/CVE-2022-29464](https://github.com/0xAgun/CVE-2022-29464)
- [oppsec/WSOB](https://github.com/oppsec/WSOB)
- [c1ph3rm4st3r/CVE-2022-29464](https://github.com/c1ph3rm4st3r/CVE-2022-29464)
- [crypticdante/CVE-2022-29464](https://github.com/crypticdante/CVE-2022-29464)
- [lowkey0808/cve-2022-29464](https://github.com/lowkey0808/cve-2022-29464)
- [superzerosec/CVE-2022-29464](https://github.com/superzerosec/CVE-2022-29464)
- [axin2019/CVE-2022-29464](https://github.com/axin2019/CVE-2022-29464)
@ -8878,7 +8878,7 @@
- [moldabekov/CVE-2021-4034](https://github.com/moldabekov/CVE-2021-4034)
- [jostmart/-CVE-2021-4034](https://github.com/jostmart/-CVE-2021-4034)
- [c3l3si4n/pwnkit](https://github.com/c3l3si4n/pwnkit)
- [c1ph3rm4st3r/CVE-2021-4034](https://github.com/c1ph3rm4st3r/CVE-2021-4034)
- [crypticdante/CVE-2021-4034](https://github.com/crypticdante/CVE-2021-4034)
- [ly4k/PwnKit](https://github.com/ly4k/PwnKit)
- [san3ncrypt3d/CVE-2021-4034-POC](https://github.com/san3ncrypt3d/CVE-2021-4034-POC)
- [fdellwing/CVE-2021-4034](https://github.com/fdellwing/CVE-2021-4034)
@ -9000,7 +9000,7 @@
- [fei9747/CVE-2021-4034](https://github.com/fei9747/CVE-2021-4034)
- [pyhrr0/pwnkit](https://github.com/pyhrr0/pwnkit)
- [mutur4/CVE-2021-4034](https://github.com/mutur4/CVE-2021-4034)
- [c1ph3rm4st3r/CVE-2021-4034_Python3](https://github.com/c1ph3rm4st3r/CVE-2021-4034_Python3)
- [crypticdante/CVE-2021-4034_Python3](https://github.com/crypticdante/CVE-2021-4034_Python3)
- [TheSermux/CVE-2021-4034](https://github.com/TheSermux/CVE-2021-4034)
### CVE-2021-4043 (2022-02-04)
@ -20027,7 +20027,7 @@
- [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC)
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
- [shen54/IT19172088](https://github.com/shen54/IT19172088)
- [c1ph3rm4st3r/CVE-2019-5736](https://github.com/c1ph3rm4st3r/CVE-2019-5736)
- [crypticdante/CVE-2019-5736](https://github.com/crypticdante/CVE-2019-5736)
- [fahmifj/Docker-breakout-runc](https://github.com/fahmifj/Docker-breakout-runc)
- [Asbatel/CVE-2019-5736_POC](https://github.com/Asbatel/CVE-2019-5736_POC)
- [takumak/cve-2019-5736-reproducer](https://github.com/takumak/cve-2019-5736-reproducer)
@ -20180,7 +20180,7 @@
- [fs0c131y/ESFileExplorerOpenPortVuln](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln)
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
- [Nehal-Zaman/CVE-2019-6447](https://github.com/Nehal-Zaman/CVE-2019-6447)
- [c1ph3rm4st3r/CVE-2019-6447](https://github.com/c1ph3rm4st3r/CVE-2019-6447)
- [crypticdante/CVE-2019-6447](https://github.com/crypticdante/CVE-2019-6447)
- [julio-cfa/POC-ES-File-Explorer-CVE-2019-6447](https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447)
- [febinrev/CVE-2019-6447-ESfile-explorer-exploit](https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit)
- [Kayky-cmd/CVE-2019-6447--.](https://github.com/Kayky-cmd/CVE-2019-6447--.)
@ -20560,7 +20560,7 @@
</code>
- [SUNNYSAINI01001/46635.py_CVE-2019-9053](https://github.com/SUNNYSAINI01001/46635.py_CVE-2019-9053)
- [c1ph3rm4st3r/CVE-2019-9053](https://github.com/c1ph3rm4st3r/CVE-2019-9053)
- [crypticdante/CVE-2019-9053](https://github.com/crypticdante/CVE-2019-9053)
- [maraspiras/46635.py](https://github.com/maraspiras/46635.py)
- [e-renna/CVE-2019-9053](https://github.com/e-renna/CVE-2019-9053)
- [zmiddle/Simple_CMS_SQLi](https://github.com/zmiddle/Simple_CMS_SQLi)
@ -21659,7 +21659,7 @@
- [M108Falcon/Sudo-CVE-2019-14287](https://github.com/M108Falcon/Sudo-CVE-2019-14287)
- [edsonjt81/CVE-2019-14287-](https://github.com/edsonjt81/CVE-2019-14287-)
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
- [c1ph3rm4st3r/CVE-2019-14287](https://github.com/c1ph3rm4st3r/CVE-2019-14287)
- [crypticdante/CVE-2019-14287](https://github.com/crypticdante/CVE-2019-14287)
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
- [5l1v3r1/cve-2019-14287sudoexp](https://github.com/5l1v3r1/cve-2019-14287sudoexp)
- [MariliaMeira/CVE-2019-14287](https://github.com/MariliaMeira/CVE-2019-14287)
@ -22008,7 +22008,7 @@
- [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278)
- [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278)
- [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278)
- [c1ph3rm4st3r/CVE-2019-16278](https://github.com/c1ph3rm4st3r/CVE-2019-16278)
- [crypticdante/CVE-2019-16278](https://github.com/crypticdante/CVE-2019-16278)
- [alexander-fernandes/CVE-2019-16278](https://github.com/alexander-fernandes/CVE-2019-16278)
- [FredBrave/CVE-2019-16278-Nostromo-1.9.6-RCE](https://github.com/FredBrave/CVE-2019-16278-Nostromo-1.9.6-RCE)
@ -25377,7 +25377,7 @@
- [k4is3r13/Bash-Script-CVE-2018-16763](https://github.com/k4is3r13/Bash-Script-CVE-2018-16763)
- [padsalatushal/CVE-2018-16763](https://github.com/padsalatushal/CVE-2018-16763)
- [wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763)
- [c1ph3rm4st3r/CVE-2018-16763](https://github.com/c1ph3rm4st3r/CVE-2018-16763)
- [crypticdante/CVE-2018-16763](https://github.com/crypticdante/CVE-2018-16763)
- [BrunoPincho/cve-2018-16763-rust](https://github.com/BrunoPincho/cve-2018-16763-rust)
- [NaturalT314/CVE-2018-16763](https://github.com/NaturalT314/CVE-2018-16763)
- [p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE)
@ -26101,7 +26101,7 @@
- [valarauco/wannafind](https://github.com/valarauco/wannafind)
- [NatteeSetobol/Etern-blue-Windows-7-Checker](https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker)
- [c1ph3rm4st3r/MS17-010_CVE-2017-0143](https://github.com/c1ph3rm4st3r/MS17-010_CVE-2017-0143)
- [crypticdante/MS17-010_CVE-2017-0143](https://github.com/crypticdante/MS17-010_CVE-2017-0143)
- [SampatDhakal/Metasploit-Attack-Report](https://github.com/SampatDhakal/Metasploit-Attack-Report)
### CVE-2017-0144 (2017-03-16)
@ -26860,7 +26860,7 @@
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
- [c1ph3rm4st3r/CVE-2017-7269](https://github.com/c1ph3rm4st3r/CVE-2017-7269)
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
@ -28496,7 +28496,7 @@
<code>Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
</code>
- [c1ph3rm4st3r/CVE-2016-1531](https://github.com/c1ph3rm4st3r/CVE-2016-1531)
- [crypticdante/CVE-2016-1531](https://github.com/crypticdante/CVE-2016-1531)
### CVE-2016-1542 (2016-06-13)
@ -29717,8 +29717,8 @@
- [bongbongco/MS15-034](https://github.com/bongbongco/MS15-034)
- [aedoo/CVE-2015-1635-POC](https://github.com/aedoo/CVE-2015-1635-POC)
- [limkokholefork/CVE-2015-1635](https://github.com/limkokholefork/CVE-2015-1635)
- [c1ph3rm4st3r/CVE-2015-1635-POC](https://github.com/c1ph3rm4st3r/CVE-2015-1635-POC)
- [c1ph3rm4st3r/CVE-2015-1635](https://github.com/c1ph3rm4st3r/CVE-2015-1635)
- [crypticdante/CVE-2015-1635-POC](https://github.com/crypticdante/CVE-2015-1635-POC)
- [crypticdante/CVE-2015-1635](https://github.com/crypticdante/CVE-2015-1635)
- [w01ke/CVE-2015-1635-POC](https://github.com/w01ke/CVE-2015-1635-POC)
- [SkinAir/ms15-034-Scan](https://github.com/SkinAir/ms15-034-Scan)
@ -30144,7 +30144,7 @@
</code>
- [Ki11i0n4ir3/CVE-2015-6668](https://github.com/Ki11i0n4ir3/CVE-2015-6668)
- [c1ph3rm4st3r/CVE-2015-6668](https://github.com/c1ph3rm4st3r/CVE-2015-6668)
- [crypticdante/CVE-2015-6668](https://github.com/crypticdante/CVE-2015-6668)
### CVE-2015-6835 (2016-05-16)
@ -30434,7 +30434,7 @@
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
- [c1ph3rm4st3r/CVE-2014-0160_Heartbleed](https://github.com/c1ph3rm4st3r/CVE-2014-0160_Heartbleed)
- [crypticdante/CVE-2014-0160_Heartbleed](https://github.com/crypticdante/CVE-2014-0160_Heartbleed)
- [GardeniaWhite/fuzzing](https://github.com/GardeniaWhite/fuzzing)
- [undacmic/heartbleed-proof-of-concept](https://github.com/undacmic/heartbleed-proof-of-concept)
- [cbk914/heartbleed-checker](https://github.com/cbk914/heartbleed-checker)
@ -31833,7 +31833,7 @@
</code>
- [Madusanka99/OHTS](https://github.com/Madusanka99/OHTS)
- [c1ph3rm4st3r/CVE-2011-1249](https://github.com/c1ph3rm4st3r/CVE-2011-1249)
- [crypticdante/CVE-2011-1249](https://github.com/crypticdante/CVE-2011-1249)
### CVE-2011-1473 (2012-06-16)
@ -32253,7 +32253,7 @@
</code>
- [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion)
- [c1ph3rm4st3r/CVE-2009-2265](https://github.com/c1ph3rm4st3r/CVE-2009-2265)
- [crypticdante/CVE-2009-2265](https://github.com/crypticdante/CVE-2009-2265)
- [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265)
- [0xkasra/CVE-2009-2265](https://github.com/0xkasra/CVE-2009-2265)
@ -32529,7 +32529,7 @@
- [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447)
- [HerculesRD/PyUsernameMapScriptRCE](https://github.com/HerculesRD/PyUsernameMapScriptRCE)
- [Aviksaikat/CVE-2007-2447](https://github.com/Aviksaikat/CVE-2007-2447)
- [c1ph3rm4st3r/CVE-2007-2447](https://github.com/c1ph3rm4st3r/CVE-2007-2447)
- [crypticdante/CVE-2007-2447](https://github.com/crypticdante/CVE-2007-2447)
- [bdunlap9/CVE-2007-2447_python](https://github.com/bdunlap9/CVE-2007-2447_python)
- [MikeRega7/CVE-2007-2447-RCE](https://github.com/MikeRega7/CVE-2007-2447-RCE)
@ -32769,7 +32769,7 @@
<code>distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
</code>
- [c1ph3rm4st3r/distccd_rce_CVE-2004-2687](https://github.com/c1ph3rm4st3r/distccd_rce_CVE-2004-2687)
- [crypticdante/distccd_rce_CVE-2004-2687](https://github.com/crypticdante/distccd_rce_CVE-2004-2687)
- [k4miyo/CVE-2004-2687](https://github.com/k4miyo/CVE-2004-2687)
- [ss0wl/distcc_v1_cve_2004_2687](https://github.com/ss0wl/distcc_v1_cve_2004_2687)