Auto Update 2023/03/17 12:29:09

This commit is contained in:
motikan2010-bot 2023-03-17 21:29:09 +09:00
parent 080662f22f
commit fd1c5df7ed
34 changed files with 183 additions and 187 deletions

View file

@ -71,10 +71,10 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2023-03-09T20:07:54Z",
"updated_at": "2023-03-17T07:06:16Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-16T08:00:13Z",
"updated_at": "2023-03-17T08:08:02Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1641,
"watchers_count": 1641,
"stargazers_count": 1642,
"watchers_count": 1642,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1641,
"watchers": 1642,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2023-03-10T07:30:21Z",
"updated_at": "2023-03-17T06:12:03Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 144,
"watchers": 145,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-16T08:00:13Z",
"updated_at": "2023-03-17T08:08:02Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1641,
"watchers_count": 1641,
"stargazers_count": 1642,
"watchers_count": 1642,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1641,
"watchers": 1642,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-16T08:00:13Z",
"updated_at": "2023-03-17T08:08:02Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1641,
"watchers_count": 1641,
"stargazers_count": 1642,
"watchers_count": 1642,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1641,
"watchers": 1642,
"score": 0
},
{

View file

@ -100,8 +100,8 @@
"description": "This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.",
"fork": false,
"created_at": "2020-03-02T16:53:02Z",
"updated_at": "2022-07-04T09:46:01Z",
"pushed_at": "2020-03-03T07:57:30Z",
"updated_at": "2023-03-17T11:13:21Z",
"pushed_at": "2023-03-17T11:15:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,

View file

@ -71,10 +71,10 @@
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2023-03-02T12:29:20Z",
"updated_at": "2023-03-17T09:36:17Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -91,7 +91,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 102,
"watchers": 104,
"score": 0
},
{

View file

@ -163,13 +163,13 @@
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 71,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
"fork": false,
"created_at": "2019-09-04T13:06:02Z",
"updated_at": "2023-03-15T20:16:13Z",
"updated_at": "2023-03-17T10:42:52Z",
"pushed_at": "2022-02-11T00:00:44Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 126,
"watchers": 127,
"score": 0
}
]

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-16T08:00:13Z",
"updated_at": "2023-03-17T08:08:02Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1641,
"watchers_count": 1641,
"stargazers_count": 1642,
"watchers_count": 1642,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1641,
"watchers": 1642,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2023-03-12T03:08:12Z",
"updated_at": "2023-03-17T08:36:43Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 154,
"watchers": 155,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-16T08:00:13Z",
"updated_at": "2023-03-17T08:08:02Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1641,
"watchers_count": 1641,
"stargazers_count": 1642,
"watchers_count": 1642,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1641,
"watchers": 1642,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
"fork": false,
"created_at": "2022-01-11T02:25:25Z",
"updated_at": "2023-03-17T01:37:05Z",
"updated_at": "2023-03-17T06:26:40Z",
"pushed_at": "2022-01-11T11:22:06Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 85,
"watchers": 86,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
"fork": false,
"created_at": "2021-04-16T20:41:26Z",
"updated_at": "2023-03-02T15:42:44Z",
"updated_at": "2023-03-17T10:38:33Z",
"pushed_at": "2021-10-04T01:13:54Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 31,
"watchers": 33,
"score": 0
},
{

View file

@ -216,19 +216,19 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-03-11T07:56:06Z",
"updated_at": "2023-03-17T09:39:48Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1461,
"watchers_count": 1461,
"stargazers_count": 1462,
"watchers_count": 1462,
"has_discussions": false,
"forks_count": 487,
"forks_count": 486,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 487,
"watchers": 1461,
"forks": 486,
"watchers": 1462,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 440,
"watchers_count": 440,
"has_discussions": false,
"forks_count": 94,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"cve-2021-40449"
],
"visibility": "public",
"forks": 94,
"forks": 95,
"watchers": 440,
"score": 0
},

View file

@ -841,12 +841,12 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2023-02-24T10:01:19Z",
"updated_at": "2023-03-17T09:41:58Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 16,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -858,8 +858,8 @@
"pentesting"
],
"visibility": "public",
"forks": 16,
"watchers": 57,
"forks": 15,
"watchers": 58,
"score": 0
},
{

View file

@ -10766,7 +10766,7 @@
"fork": false,
"created_at": "2022-01-16T16:39:19Z",
"updated_at": "2022-04-02T16:13:36Z",
"pushed_at": "2023-03-04T11:04:18Z",
"pushed_at": "2023-03-17T09:09:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2023-03-17T03:31:30Z",
"updated_at": "2023-03-17T07:07:00Z",
"pushed_at": "2023-01-10T16:25:49Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 177,
"watchers_count": 177,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 176,
"watchers": 177,
"score": 0
}
]

View file

@ -231,13 +231,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 14,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-15T20:36:51Z",
"updated_at": "2022-09-17T07:00:57Z",
"updated_at": "2023-03-17T11:49:32Z",
"pushed_at": "2022-08-15T20:41:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -220,10 +220,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2023-03-14T03:29:03Z",
"updated_at": "2023-03-17T09:55:26Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 229,
"watchers_count": 229,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -236,7 +236,7 @@
],
"visibility": "public",
"forks": 41,
"watchers": 228,
"watchers": 229,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
"fork": false,
"created_at": "2023-01-13T21:27:03Z",
"updated_at": "2023-03-09T11:59:51Z",
"updated_at": "2023-03-17T07:53:49Z",
"pushed_at": "2023-01-20T10:31:58Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-03-17T06:09:21Z",
"updated_at": "2023-03-17T10:58:55Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 210,
"watchers_count": 210,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 207,
"forks": 30,
"watchers": 210,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "File Manager for CVE-2022-46689",
"fork": false,
"created_at": "2022-12-28T22:13:35Z",
"updated_at": "2023-03-12T01:35:30Z",
"updated_at": "2023-03-17T08:50:43Z",
"pushed_at": "2023-01-02T00:36:39Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 78,
"watchers": 79,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-21T01:02:01Z",
"updated_at": "2023-03-17T05:31:27Z",
"updated_at": "2023-03-17T07:03:55Z",
"pushed_at": "2023-02-16T13:49:47Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Drag and Drop Multiple File Uploader PRO - Contact Form 7 v5.0.6.1 Path Traversal (CVE-2023-1112)",
"fork": false,
"created_at": "2023-02-04T03:03:05Z",
"updated_at": "2023-03-15T07:33:53Z",
"updated_at": "2023-03-17T11:24:22Z",
"pushed_at": "2023-03-07T01:31:57Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"use-after-free"
],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 183,
"score": 0
},

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-16T21:21:11Z",
"updated_at": "2023-03-17T07:38:28Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 298,
"watchers_count": 298,
"stargazers_count": 299,
"watchers_count": 299,
"has_discussions": false,
"forks_count": 112,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 298,
"forks": 113,
"watchers": 299,
"score": 0
},
{
@ -76,7 +76,7 @@
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -90,7 +90,7 @@
"windows"
],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 86,
"score": 0
},
@ -108,10 +108,10 @@
"description": "Windows_AFD_LPE_CVE-2023-21768",
"fork": false,
"created_at": "2023-03-13T20:32:50Z",
"updated_at": "2023-03-16T14:20:21Z",
"updated_at": "2023-03-17T07:37:03Z",
"pushed_at": "2023-03-13T21:16:01Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 8,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-03-17T04:40:50Z",
"updated_at": "2023-03-17T07:52:14Z",
"pushed_at": "2023-03-03T03:30:04Z",
"stargazers_count": 464,
"watchers_count": 464,
"stargazers_count": 465,
"watchers_count": 465,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 464,
"watchers": 465,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit and report for CVE-2023-23396.",
"fork": false,
"created_at": "2023-03-16T17:28:27Z",
"updated_at": "2023-03-16T18:46:51Z",
"updated_at": "2023-03-17T10:45:40Z",
"pushed_at": "2023-03-16T17:38:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-03-17T06:29:31Z",
"updated_at": "2023-03-17T10:25:07Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 26,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 90,
"forks": 28,
"watchers": 98,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "CVE-2023-23397 - Microsoft Outlook Vulnerability",
"fork": false,
"created_at": "2023-03-16T14:07:15Z",
"updated_at": "2023-03-16T14:08:27Z",
"pushed_at": "2023-03-16T14:09:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2023-03-17T08:46:52Z",
"pushed_at": "2023-03-17T09:46:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -100,19 +100,19 @@
"description": "Python script to create a message with the vulenrability properties set",
"fork": false,
"created_at": "2023-03-16T15:00:26Z",
"updated_at": "2023-03-16T15:02:06Z",
"updated_at": "2023-03-17T08:43:11Z",
"pushed_at": "2023-03-16T15:02:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0
},
{
@ -129,10 +129,10 @@
"description": "Simple PoC in PowerShell for CVE-2023-23397",
"fork": false,
"created_at": "2023-03-16T19:10:37Z",
"updated_at": "2023-03-16T20:44:47Z",
"updated_at": "2023-03-17T10:55:25Z",
"pushed_at": "2023-03-16T19:29:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -151,7 +151,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -168,19 +168,19 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-03-17T06:10:39Z",
"pushed_at": "2023-03-17T03:57:08Z",
"stargazers_count": 67,
"watchers_count": 67,
"updated_at": "2023-03-17T12:19:38Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 14,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 67,
"forks": 17,
"watchers": 91,
"score": 0
},
{
@ -211,5 +211,34 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 615197592,
"name": "CVE-2023-23397-PoC-PowerShell",
"full_name": "cleverg0d\/CVE-2023-23397-PoC-PowerShell",
"owner": {
"login": "cleverg0d",
"id": 108401157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108401157?v=4",
"html_url": "https:\/\/github.com\/cleverg0d"
},
"html_url": "https:\/\/github.com\/cleverg0d\/CVE-2023-23397-PoC-PowerShell",
"description": "PoC for CVE-2023-23397",
"fork": false,
"created_at": "2023-03-17T06:52:42Z",
"updated_at": "2023-03-17T06:53:57Z",
"pushed_at": "2023-03-17T07:36:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 614868768,
"name": "CVE-2023-25610-mass",
"full_name": "l1ced\/CVE-2023-25610-mass",
"owner": {
"login": "l1ced",
"id": 128054186,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128054186?v=4",
"html_url": "https:\/\/github.com\/l1ced"
},
"html_url": "https:\/\/github.com\/l1ced\/CVE-2023-25610-mass",
"description": "Mass RCE Exploiter for Fortinet(FortiOS\/Fortiproxy) CVE-2023-25610",
"fork": false,
"created_at": "2023-03-16T13:37:47Z",
"updated_at": "2023-03-16T16:11:28Z",
"pushed_at": "2023-03-16T13:38:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -257,6 +257,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability
- [ka7ana/CVE-2023-23397](https://github.com/ka7ana/CVE-2023-23397)
- [api0cradle/CVE-2023-23397-POC-Powershell](https://github.com/api0cradle/CVE-2023-23397-POC-Powershell)
- [im007/CVE-2023-23397](https://github.com/im007/CVE-2023-23397)
- [cleverg0d/CVE-2023-23397-PoC-PowerShell](https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell)
### CVE-2023-23488 (2023-01-20)
@ -360,9 +361,6 @@ A possible security vulnerability has been identified in Apache Kafka Connect. T
- [ohnonoyesyes/CVE-2023-25194](https://github.com/ohnonoyesyes/CVE-2023-25194)
### CVE-2023-25610
- [l1ced/CVE-2023-25610-mass](https://github.com/l1ced/CVE-2023-25610-mass)
### CVE-2023-26262 (2023-03-14)
<code>