mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/03/17 12:29:09
This commit is contained in:
parent
080662f22f
commit
fd1c5df7ed
34 changed files with 183 additions and 187 deletions
|
@ -71,10 +71,10 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2023-03-09T20:07:54Z",
|
||||
"updated_at": "2023-03-17T07:06:16Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-16T08:00:13Z",
|
||||
"updated_at": "2023-03-17T08:08:02Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1641,
|
||||
"watchers_count": 1641,
|
||||
"stargazers_count": 1642,
|
||||
"watchers_count": 1642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1641,
|
||||
"watchers": 1642,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2023-03-10T07:30:21Z",
|
||||
"updated_at": "2023-03-17T06:12:03Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-16T08:00:13Z",
|
||||
"updated_at": "2023-03-17T08:08:02Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1641,
|
||||
"watchers_count": 1641,
|
||||
"stargazers_count": 1642,
|
||||
"watchers_count": 1642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1641,
|
||||
"watchers": 1642,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-16T08:00:13Z",
|
||||
"updated_at": "2023-03-17T08:08:02Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1641,
|
||||
"watchers_count": 1641,
|
||||
"stargazers_count": 1642,
|
||||
"watchers_count": 1642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1641,
|
||||
"watchers": 1642,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,8 +100,8 @@
|
|||
"description": "This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T16:53:02Z",
|
||||
"updated_at": "2022-07-04T09:46:01Z",
|
||||
"pushed_at": "2020-03-03T07:57:30Z",
|
||||
"updated_at": "2023-03-17T11:13:21Z",
|
||||
"pushed_at": "2023-03-17T11:15:46Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-26T15:00:29Z",
|
||||
"updated_at": "2023-03-02T12:29:20Z",
|
||||
"updated_at": "2023-03-17T09:36:17Z",
|
||||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 102,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -163,13 +163,13 @@
|
|||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-04T13:06:02Z",
|
||||
"updated_at": "2023-03-15T20:16:13Z",
|
||||
"updated_at": "2023-03-17T10:42:52Z",
|
||||
"pushed_at": "2022-02-11T00:00:44Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-16T08:00:13Z",
|
||||
"updated_at": "2023-03-17T08:08:02Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1641,
|
||||
"watchers_count": 1641,
|
||||
"stargazers_count": 1642,
|
||||
"watchers_count": 1642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1641,
|
||||
"watchers": 1642,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2023-03-12T03:08:12Z",
|
||||
"updated_at": "2023-03-17T08:36:43Z",
|
||||
"pushed_at": "2021-08-16T18:16:20Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -42,7 +42,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-16T08:00:13Z",
|
||||
"updated_at": "2023-03-17T08:08:02Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1641,
|
||||
"watchers_count": 1641,
|
||||
"stargazers_count": 1642,
|
||||
"watchers_count": 1642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1641,
|
||||
"watchers": 1642,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-11T02:25:25Z",
|
||||
"updated_at": "2023-03-17T01:37:05Z",
|
||||
"updated_at": "2023-03-17T06:26:40Z",
|
||||
"pushed_at": "2022-01-11T11:22:06Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-16T20:41:26Z",
|
||||
"updated_at": "2023-03-02T15:42:44Z",
|
||||
"updated_at": "2023-03-17T10:38:33Z",
|
||||
"pushed_at": "2021-10-04T01:13:54Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -216,19 +216,19 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2023-03-11T07:56:06Z",
|
||||
"updated_at": "2023-03-17T09:39:48Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1461,
|
||||
"watchers_count": 1461,
|
||||
"stargazers_count": 1462,
|
||||
"watchers_count": 1462,
|
||||
"has_discussions": false,
|
||||
"forks_count": 487,
|
||||
"forks_count": 486,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 487,
|
||||
"watchers": 1461,
|
||||
"forks": 486,
|
||||
"watchers": 1462,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"has_discussions": false,
|
||||
"forks_count": 94,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"cve-2021-40449"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"forks": 95,
|
||||
"watchers": 440,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -841,12 +841,12 @@
|
|||
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T01:31:13Z",
|
||||
"updated_at": "2023-02-24T10:01:19Z",
|
||||
"updated_at": "2023-03-17T09:41:58Z",
|
||||
"pushed_at": "2021-10-07T08:25:26Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -858,8 +858,8 @@
|
|||
"pentesting"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 57,
|
||||
"forks": 15,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -10766,7 +10766,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-16T16:39:19Z",
|
||||
"updated_at": "2022-04-02T16:13:36Z",
|
||||
"pushed_at": "2023-03-04T11:04:18Z",
|
||||
"pushed_at": "2023-03-17T09:09:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2023-03-17T03:31:30Z",
|
||||
"updated_at": "2023-03-17T07:07:00Z",
|
||||
"pushed_at": "2023-01-10T16:25:49Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 176,
|
||||
"watchers": 177,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -231,13 +231,13 @@
|
|||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-15T20:36:51Z",
|
||||
"updated_at": "2022-09-17T07:00:57Z",
|
||||
"updated_at": "2023-03-17T11:49:32Z",
|
||||
"pushed_at": "2022-08-15T20:41:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -220,10 +220,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2023-03-14T03:29:03Z",
|
||||
"updated_at": "2023-03-17T09:55:26Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -236,7 +236,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 228,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-13T21:27:03Z",
|
||||
"updated_at": "2023-03-09T11:59:51Z",
|
||||
"updated_at": "2023-03-17T07:53:49Z",
|
||||
"pushed_at": "2023-01-20T10:31:58Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-02T15:34:28Z",
|
||||
"updated_at": "2023-03-17T06:09:21Z",
|
||||
"updated_at": "2023-03-17T10:58:55Z",
|
||||
"pushed_at": "2023-02-02T16:53:37Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 207,
|
||||
"forks": 30,
|
||||
"watchers": 210,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "File Manager for CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-28T22:13:35Z",
|
||||
"updated_at": "2023-03-12T01:35:30Z",
|
||||
"updated_at": "2023-03-17T08:50:43Z",
|
||||
"pushed_at": "2023-01-02T00:36:39Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T01:02:01Z",
|
||||
"updated_at": "2023-03-17T05:31:27Z",
|
||||
"updated_at": "2023-03-17T07:03:55Z",
|
||||
"pushed_at": "2023-02-16T13:49:47Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 135,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Drag and Drop Multiple File Uploader PRO - Contact Form 7 v5.0.6.1 Path Traversal (CVE-2023-1112)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-04T03:03:05Z",
|
||||
"updated_at": "2023-03-15T07:33:53Z",
|
||||
"updated_at": "2023-03-17T11:24:22Z",
|
||||
"pushed_at": "2023-03-07T01:31:57Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
"use-after-free"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 41,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-03-16T21:21:11Z",
|
||||
"updated_at": "2023-03-17T07:38:28Z",
|
||||
"pushed_at": "2023-03-10T08:58:44Z",
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 298,
|
||||
"forks": 113,
|
||||
"watchers": 299,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -76,7 +76,7 @@
|
|||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -90,7 +90,7 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"forks": 25,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -108,10 +108,10 @@
|
|||
"description": "Windows_AFD_LPE_CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-13T20:32:50Z",
|
||||
"updated_at": "2023-03-16T14:20:21Z",
|
||||
"updated_at": "2023-03-17T07:37:03Z",
|
||||
"pushed_at": "2023-03-13T21:16:01Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-03-17T04:40:50Z",
|
||||
"updated_at": "2023-03-17T07:52:14Z",
|
||||
"pushed_at": "2023-03-03T03:30:04Z",
|
||||
"stargazers_count": 464,
|
||||
"watchers_count": 464,
|
||||
"stargazers_count": 465,
|
||||
"watchers_count": 465,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 464,
|
||||
"watchers": 465,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit and report for CVE-2023-23396.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T17:28:27Z",
|
||||
"updated_at": "2023-03-16T18:46:51Z",
|
||||
"updated_at": "2023-03-17T10:45:40Z",
|
||||
"pushed_at": "2023-03-16T17:38:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit for the CVE-2023-23397",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T17:03:38Z",
|
||||
"updated_at": "2023-03-17T06:29:31Z",
|
||||
"updated_at": "2023-03-17T10:25:07Z",
|
||||
"pushed_at": "2023-03-15T17:53:53Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 90,
|
||||
"forks": 28,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2023-23397 - Microsoft Outlook Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T14:07:15Z",
|
||||
"updated_at": "2023-03-16T14:08:27Z",
|
||||
"pushed_at": "2023-03-16T14:09:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2023-03-17T08:46:52Z",
|
||||
"pushed_at": "2023-03-17T09:46:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -100,19 +100,19 @@
|
|||
"description": "Python script to create a message with the vulenrability properties set",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T15:00:26Z",
|
||||
"updated_at": "2023-03-16T15:02:06Z",
|
||||
"updated_at": "2023-03-17T08:43:11Z",
|
||||
"pushed_at": "2023-03-16T15:02:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -129,10 +129,10 @@
|
|||
"description": "Simple PoC in PowerShell for CVE-2023-23397",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:10:37Z",
|
||||
"updated_at": "2023-03-16T20:44:47Z",
|
||||
"updated_at": "2023-03-17T10:55:25Z",
|
||||
"pushed_at": "2023-03-16T19:29:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -151,7 +151,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -168,19 +168,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:43:39Z",
|
||||
"updated_at": "2023-03-17T06:10:39Z",
|
||||
"pushed_at": "2023-03-17T03:57:08Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"updated_at": "2023-03-17T12:19:38Z",
|
||||
"pushed_at": "2023-03-17T07:47:40Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 67,
|
||||
"forks": 17,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -211,5 +211,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 615197592,
|
||||
"name": "CVE-2023-23397-PoC-PowerShell",
|
||||
"full_name": "cleverg0d\/CVE-2023-23397-PoC-PowerShell",
|
||||
"owner": {
|
||||
"login": "cleverg0d",
|
||||
"id": 108401157,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108401157?v=4",
|
||||
"html_url": "https:\/\/github.com\/cleverg0d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cleverg0d\/CVE-2023-23397-PoC-PowerShell",
|
||||
"description": "PoC for CVE-2023-23397",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-17T06:52:42Z",
|
||||
"updated_at": "2023-03-17T06:53:57Z",
|
||||
"pushed_at": "2023-03-17T07:36:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 614868768,
|
||||
"name": "CVE-2023-25610-mass",
|
||||
"full_name": "l1ced\/CVE-2023-25610-mass",
|
||||
"owner": {
|
||||
"login": "l1ced",
|
||||
"id": 128054186,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128054186?v=4",
|
||||
"html_url": "https:\/\/github.com\/l1ced"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l1ced\/CVE-2023-25610-mass",
|
||||
"description": "Mass RCE Exploiter for Fortinet(FortiOS\/Fortiproxy) CVE-2023-25610",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T13:37:47Z",
|
||||
"updated_at": "2023-03-16T16:11:28Z",
|
||||
"pushed_at": "2023-03-16T13:38:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -257,6 +257,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability
|
|||
- [ka7ana/CVE-2023-23397](https://github.com/ka7ana/CVE-2023-23397)
|
||||
- [api0cradle/CVE-2023-23397-POC-Powershell](https://github.com/api0cradle/CVE-2023-23397-POC-Powershell)
|
||||
- [im007/CVE-2023-23397](https://github.com/im007/CVE-2023-23397)
|
||||
- [cleverg0d/CVE-2023-23397-PoC-PowerShell](https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell)
|
||||
|
||||
### CVE-2023-23488 (2023-01-20)
|
||||
|
||||
|
@ -360,9 +361,6 @@ A possible security vulnerability has been identified in Apache Kafka Connect. T
|
|||
|
||||
- [ohnonoyesyes/CVE-2023-25194](https://github.com/ohnonoyesyes/CVE-2023-25194)
|
||||
|
||||
### CVE-2023-25610
|
||||
- [l1ced/CVE-2023-25610-mass](https://github.com/l1ced/CVE-2023-25610-mass)
|
||||
|
||||
### CVE-2023-26262 (2023-03-14)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue