Auto Update 2023/03/22 00:28:20

This commit is contained in:
motikan2010-bot 2023-03-22 09:28:20 +09:00
parent e18f98dabc
commit fb06ca16f5
29 changed files with 553 additions and 127 deletions

View file

@ -76,7 +76,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -86,7 +86,7 @@
"shell"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 3,
"score": 0
},

View file

@ -80,13 +80,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 17,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-04-24T12:04:27Z",
"updated_at": "2021-07-09T07:18:59Z",
"updated_at": "2023-03-21T18:57:40Z",
"pushed_at": "2021-04-29T02:26:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -78,10 +78,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2023-03-12T11:18:14Z",
"updated_at": "2023-03-21T21:14:45Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 548,
"watchers_count": 548,
"stargazers_count": 547,
"watchers_count": 547,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -100,7 +100,7 @@
],
"visibility": "public",
"forks": 178,
"watchers": 548,
"watchers": 547,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 5,
"score": 0
},

View file

@ -1,4 +1,33 @@
[
{
"id": 233959211,
"name": "CVE-2020-0601",
"full_name": "nissan-sudo\/CVE-2020-0601",
"owner": {
"login": "nissan-sudo",
"id": 58976920,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58976920?v=4",
"html_url": "https:\/\/github.com\/nissan-sudo"
},
"html_url": "https:\/\/github.com\/nissan-sudo\/CVE-2020-0601",
"description": "Remote Code Execution Exploit ",
"fork": false,
"created_at": "2020-01-14T23:53:18Z",
"updated_at": "2021-12-05T20:29:52Z",
"pushed_at": "2020-01-14T23:56:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 233960159,
"name": "cve-2020-0601",
@ -28,6 +57,69 @@
"watchers": 36,
"score": 0
},
{
"id": 234134766,
"name": "CVE-2020-0601",
"full_name": "SherlockSec\/CVE-2020-0601",
"owner": {
"login": "SherlockSec",
"id": 37545173,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37545173?v=4",
"html_url": "https:\/\/github.com\/SherlockSec"
},
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
"description": "A Windows Crypto Exploit",
"fork": false,
"created_at": "2020-01-15T17:26:58Z",
"updated_at": "2020-01-16T20:56:07Z",
"pushed_at": "2020-01-15T17:28:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2020-0601",
"exploit",
"windows"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 234146234,
"name": "CVE-2020-0601",
"full_name": "JPurrier\/CVE-2020-0601",
"owner": {
"login": "JPurrier",
"id": 25715340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25715340?v=4",
"html_url": "https:\/\/github.com\/JPurrier"
},
"html_url": "https:\/\/github.com\/JPurrier\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-15T18:31:30Z",
"updated_at": "2021-12-05T20:30:14Z",
"pushed_at": "2020-01-17T10:49:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 234190972,
"name": "cve-2020-0601-plugin",
@ -57,6 +149,37 @@
"watchers": 6,
"score": 0
},
{
"id": 234191063,
"name": "CurveBall",
"full_name": "ly4k\/CurveBall",
"owner": {
"login": "ly4k",
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ly4k"
},
"html_url": "https:\/\/github.com\/ly4k\/CurveBall",
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2023-03-20T17:43:38Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 879,
"watchers_count": 879,
"has_discussions": false,
"forks_count": 218,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-0601"
],
"visibility": "public",
"forks": 218,
"watchers": 879,
"score": 0
},
{
"id": 234192123,
"name": "chainoffools",
@ -182,6 +305,35 @@
"watchers": 66,
"score": 0
},
{
"id": 234442281,
"name": "cve-2020-0601-utils",
"full_name": "0xxon\/cve-2020-0601-utils",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
"fork": false,
"created_at": "2020-01-17T01:02:52Z",
"updated_at": "2021-12-05T20:30:51Z",
"pushed_at": "2020-01-21T19:48:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 234574037,
"name": "Windows10_Cumulative_Updates_PowerShell",
@ -211,6 +363,209 @@
"watchers": 1,
"score": 0
},
{
"id": 234588471,
"name": "CVE-2020-0601",
"full_name": "MarkusZehnle\/CVE-2020-0601",
"owner": {
"login": "MarkusZehnle",
"id": 60010315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60010315?v=4",
"html_url": "https:\/\/github.com\/MarkusZehnle"
},
"html_url": "https:\/\/github.com\/MarkusZehnle\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-17T16:24:31Z",
"updated_at": "2021-12-05T20:31:07Z",
"pushed_at": "2020-01-17T16:42:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 234598729,
"name": "CVE-2020-0601",
"full_name": "YoannDqr\/CVE-2020-0601",
"owner": {
"login": "YoannDqr",
"id": 26006989,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26006989?v=4",
"html_url": "https:\/\/github.com\/YoannDqr"
},
"html_url": "https:\/\/github.com\/YoannDqr\/CVE-2020-0601",
"description": "CurveBall CVE exploitation",
"fork": false,
"created_at": "2020-01-17T17:17:55Z",
"updated_at": "2021-12-05T20:31:14Z",
"pushed_at": "2020-01-20T10:52:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 234714299,
"name": "cve-2020-0601-Perl",
"full_name": "thimelp\/cve-2020-0601-Perl",
"owner": {
"login": "thimelp",
"id": 60032194,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60032194?v=4",
"html_url": "https:\/\/github.com\/thimelp"
},
"html_url": "https:\/\/github.com\/thimelp\/cve-2020-0601-Perl",
"description": "Perl version of recently published scripts to build ECC certificates with specific parameters re CVE-2020-0601",
"fork": false,
"created_at": "2020-01-18T09:58:16Z",
"updated_at": "2021-12-05T20:31:20Z",
"pushed_at": "2020-01-18T12:07:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 234920281,
"name": "curveball_lua",
"full_name": "dlee35\/curveball_lua",
"owner": {
"login": "dlee35",
"id": 7849311,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7849311?v=4",
"html_url": "https:\/\/github.com\/dlee35"
},
"html_url": "https:\/\/github.com\/dlee35\/curveball_lua",
"description": "Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic",
"fork": false,
"created_at": "2020-01-19T15:20:19Z",
"updated_at": "2021-12-05T20:31:27Z",
"pushed_at": "2020-01-19T21:25:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 234944443,
"name": "-CVE-2020-0601-ECC---EXPLOIT",
"full_name": "IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"owner": {
"login": "IIICTECH",
"id": 5104528,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5104528?v=4",
"html_url": "https:\/\/github.com\/IIICTECH"
},
"html_url": "https:\/\/github.com\/IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"description": "CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. ",
"fork": false,
"created_at": "2020-01-19T18:20:26Z",
"updated_at": "2021-12-27T02:06:01Z",
"pushed_at": "2020-01-19T18:26:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 235000073,
"name": "CVE-2020-0601",
"full_name": "Ash112121\/CVE-2020-0601",
"owner": {
"login": "Ash112121",
"id": 50549802,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50549802?v=4",
"html_url": "https:\/\/github.com\/Ash112121"
},
"html_url": "https:\/\/github.com\/Ash112121\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-20T02:04:05Z",
"updated_at": "2021-12-05T20:31:43Z",
"pushed_at": "2020-01-20T02:05:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 235145190,
"name": "curveball",
"full_name": "gentilkiwi\/curveball",
"owner": {
"login": "gentilkiwi",
"id": 2307945,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2307945?v=4",
"html_url": "https:\/\/github.com\/gentilkiwi"
},
"html_url": "https:\/\/github.com\/gentilkiwi\/curveball",
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2023-03-18T09:54:53Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 74,
"score": 0
},
{
"id": 235858699,
"name": "CurveBall",

View file

@ -1723,10 +1723,10 @@
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
"fork": false,
"created_at": "2020-07-06T14:45:07Z",
"updated_at": "2022-08-03T08:54:39Z",
"updated_at": "2023-03-21T19:35:31Z",
"pushed_at": "2020-07-06T19:00:06Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -1740,7 +1740,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 45,
"watchers": 46,
"score": 0
},
{

View file

@ -49,6 +49,35 @@
"watchers": 1645,
"score": 0
},
{
"id": 234696172,
"name": "CVE-2020-2551",
"full_name": "jas502n\/CVE-2020-2551",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-2551",
"description": "Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-18T07:08:06Z",
"updated_at": "2023-02-28T01:21:34Z",
"pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 82,
"score": 0
},
{
"id": 234901198,
"name": "CVE-2020-2551",

31
2020/CVE-2020-2655.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 233879183,
"name": "CVE-2020-2655-DemoServer",
"full_name": "RUB-NDS\/CVE-2020-2655-DemoServer",
"owner": {
"login": "RUB-NDS",
"id": 11559003,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11559003?v=4",
"html_url": "https:\/\/github.com\/RUB-NDS"
},
"html_url": "https:\/\/github.com\/RUB-NDS\/CVE-2020-2655-DemoServer",
"description": null,
"fork": false,
"created_at": "2020-01-14T15:59:48Z",
"updated_at": "2020-03-20T23:04:07Z",
"pushed_at": "2020-01-20T10:45:47Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -47,7 +47,7 @@
"stargazers_count": 428,
"watchers_count": 428,
"has_discussions": false,
"forks_count": 142,
"forks_count": 143,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -55,7 +55,7 @@
"cve-2021-21972"
],
"visibility": "public",
"forks": 142,
"forks": 143,
"watchers": 428,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2023-03-21T01:55:27Z",
"updated_at": "2023-03-21T22:16:50Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 174,
"watchers": 175,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0
}

View file

@ -3647,19 +3647,19 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-03-21T09:11:52Z",
"updated_at": "2023-03-21T23:30:40Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3215,
"watchers_count": 3215,
"stargazers_count": 3216,
"watchers_count": 3216,
"has_discussions": true,
"forks_count": 747,
"forks_count": 748,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 747,
"watchers": 3215,
"forks": 748,
"watchers": 3216,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2023-03-16T06:52:31Z",
"updated_at": "2023-03-21T19:08:40Z",
"pushed_at": "2022-04-25T04:11:33Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 354,
"watchers_count": 354,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 355,
"watchers": 354,
"score": 0
},
{

View file

@ -1,43 +1,4 @@
[
{
"id": 443493438,
"name": "homekitdos",
"full_name": "trevorspiniolas\/homekitdos",
"owner": {
"login": "trevorspiniolas",
"id": 71231568,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71231568?v=4",
"html_url": "https:\/\/github.com\/trevorspiniolas"
},
"html_url": "https:\/\/github.com\/trevorspiniolas\/homekitdos",
"description": "CVE-2022-22588 for iOS 15.2 and below.",
"fork": false,
"created_at": "2022-01-01T07:38:48Z",
"updated_at": "2022-07-25T22:47:12Z",
"pushed_at": "2022-03-09T18:32:20Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-22588",
"dos",
"homekit",
"ios",
"ios15",
"poc",
"security-vulnerability",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 22,
"score": 0
},
{
"id": 505010952,
"name": "0DAYIPHONE13IOS15.2CVE-2022-22588",

View file

@ -13,10 +13,10 @@
"description": "The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc",
"fork": false,
"created_at": "2023-03-02T20:18:54Z",
"updated_at": "2023-03-20T08:59:48Z",
"updated_at": "2023-03-21T21:28:50Z",
"pushed_at": "2023-03-08T20:32:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2022-26937",
"description": "A Zeek package to detect CVE-2022-26937, a vulnerability in the Network Lock Manager (NLM) protocol in Windows MFS server.",
"description": "A Zeek package to detect CVE-2022-26937, a vulnerability in the Network Lock Manager (NLM) protocol in Windows NFS server.",
"fork": false,
"created_at": "2022-05-11T18:36:45Z",
"updated_at": "2022-10-14T21:51:05Z",
"updated_at": "2023-03-21T20:23:54Z",
"pushed_at": "2022-05-17T16:53:38Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -18,13 +18,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -46,10 +46,10 @@
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
"fork": false,
"created_at": "2023-02-23T10:04:58Z",
"updated_at": "2023-03-21T13:25:02Z",
"updated_at": "2023-03-21T23:42:23Z",
"pushed_at": "2023-03-14T08:41:51Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 61,
"watchers": 64,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-03-19T22:49:36Z",
"updated_at": "2023-03-21T21:13:18Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 215,
"watchers": 216,
"score": 0
},
{
@ -190,10 +190,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false,
"created_at": "2023-02-05T18:42:27Z",
"updated_at": "2023-03-21T13:37:12Z",
"updated_at": "2023-03-21T21:12:29Z",
"pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -202,7 +202,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 119,
"watchers": 120,
"score": 0
},
{

View file

@ -1,22 +1,22 @@
[
{
"id": 615901503,
"name": "anti-acropalypse",
"full_name": "qixils\/anti-acropalypse",
"name": "anticropalypse",
"full_name": "qixils\/anticropalypse",
"owner": {
"login": "qixils",
"id": 13265322,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13265322?v=4",
"html_url": "https:\/\/github.com\/qixils"
},
"html_url": "https:\/\/github.com\/qixils\/anti-acropalypse",
"html_url": "https:\/\/github.com\/qixils\/anticropalypse",
"description": "Discord bot which monitors for and deletes images vulnerable to the Acropalypse exploit (CVE-2023-21036)",
"fork": false,
"created_at": "2023-03-19T02:15:23Z",
"updated_at": "2023-03-21T17:58:07Z",
"pushed_at": "2023-03-20T01:45:52Z",
"stargazers_count": 5,
"watchers_count": 5,
"updated_at": "2023-03-21T23:14:20Z",
"pushed_at": "2023-03-21T23:38:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-21T17:14:53Z",
"updated_at": "2023-03-22T00:01:54Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 319,
"watchers_count": 319,
"stargazers_count": 321,
"watchers_count": 321,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 319,
"watchers": 321,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-03-21T15:58:11Z",
"updated_at": "2023-03-21T19:55:45Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 127,
"watchers": 128,
"score": 0
},
{
@ -371,10 +371,10 @@
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
"fork": false,
"created_at": "2023-03-20T16:31:54Z",
"updated_at": "2023-03-21T17:40:44Z",
"updated_at": "2023-03-21T23:58:47Z",
"pushed_at": "2023-03-20T16:55:25Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -385,7 +385,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 10,
"score": 0
},
{
@ -416,5 +416,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 617122203,
"name": "CVE-2023-23397",
"full_name": "tiepologian\/CVE-2023-23397",
"owner": {
"login": "tiepologian",
"id": 4747002,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4747002?v=4",
"html_url": "https:\/\/github.com\/tiepologian"
},
"html_url": "https:\/\/github.com\/tiepologian\/CVE-2023-23397",
"description": "Proof of Concept for CVE-2023-23397 in Python",
"fork": false,
"created_at": "2023-03-21T18:38:00Z",
"updated_at": "2023-03-21T18:38:59Z",
"pushed_at": "2023-03-21T18:43:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 0,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2023-03-21T17:33:48Z",
"updated_at": "2023-03-21T23:10:00Z",
"pushed_at": "2023-03-20T12:51:29Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 70,
"watchers": 75,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "The simple PoC of CVE-2023-27587",
"fork": false,
"created_at": "2023-03-15T15:52:20Z",
"updated_at": "2023-03-20T22:48:05Z",
"updated_at": "2023-03-21T18:42:21Z",
"pushed_at": "2023-03-15T16:31:11Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -13,7 +13,7 @@
"description": "Altenergy Power System Control Software set_timezone RCE Vulnerability (CVE-2023-28343)",
"fork": false,
"created_at": "2023-03-21T11:41:36Z",
"updated_at": "2023-03-21T11:41:36Z",
"updated_at": "2023-03-21T21:20:35Z",
"pushed_at": "2023-03-21T11:43:52Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -116,7 +116,7 @@ In onPackageRemoved of AccessibilityManagerService.java, there is a possibility
- [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2023-20921](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2023-20921)
### CVE-2023-21036
- [qixils/anti-acropalypse](https://github.com/qixils/anti-acropalypse)
- [qixils/anticropalypse](https://github.com/qixils/anticropalypse)
### CVE-2023-21608 (2023-01-18)
@ -288,6 +288,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability
- [ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook](https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook)
- [Trackflaw/CVE-2023-23397](https://github.com/Trackflaw/CVE-2023-23397)
- [SecCTechs/CVE-2023-23397](https://github.com/SecCTechs/CVE-2023-23397)
- [tiepologian/CVE-2023-23397](https://github.com/tiepologian/CVE-2023-23397)
### CVE-2023-23415 (2023-03-14)
@ -1847,7 +1848,6 @@ A validation issue existed in the handling of symlinks. This issue was addressed
A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 15.2.1 and iPadOS 15.2.1. Processing a maliciously crafted HomeKit accessory name may cause a denial of service.
</code>
- [trevorspiniolas/homekitdos](https://github.com/trevorspiniolas/homekitdos)
- [PyterSmithDarkGhost/0DAYIPHONE13IOS15.2CVE-2022-22588](https://github.com/PyterSmithDarkGhost/0DAYIPHONE13IOS15.2CVE-2022-22588)
### CVE-2022-22600 (2022-03-18)
@ -13661,13 +13661,25 @@ Race condition in the Intel(R) Driver and Support Assistant before version 20.1.
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
</code>
- [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601)
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
- [ly4k/CurveBall](https://github.com/ly4k/CurveBall)
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
- [BlueTeamSteve/CVE-2020-0601](https://github.com/BlueTeamSteve/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [Doug-Moody/Windows10_Cumulative_Updates_PowerShell](https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell)
- [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601)
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
- [thimelp/cve-2020-0601-Perl](https://github.com/thimelp/cve-2020-0601-Perl)
- [dlee35/curveball_lua](https://github.com/dlee35/curveball_lua)
- [IIICTECH/-CVE-2020-0601-ECC---EXPLOIT](https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT)
- [Ash112121/CVE-2020-0601](https://github.com/Ash112121/CVE-2020-0601)
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
- [ioncodes/Curveball](https://github.com/ioncodes/Curveball)
@ -14370,6 +14382,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
</code>
- [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner)
- [jas502n/CVE-2020-2551](https://github.com/jas502n/CVE-2020-2551)
- [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551)
- [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551)
- [0xlane/CVE-2020-2551](https://github.com/0xlane/CVE-2020-2551)
@ -14408,6 +14421,14 @@ Vulnerability in the Primavera P6 Enterprise Project Portfolio Management produc
- [5l1v3r1/CVE-2020-2556](https://github.com/5l1v3r1/CVE-2020-2556)
### CVE-2020-2655 (2020-01-15)
<code>
Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
</code>
- [RUB-NDS/CVE-2020-2655-DemoServer](https://github.com/RUB-NDS/CVE-2020-2655-DemoServer)
### CVE-2020-2883 (2020-04-15)
<code>