diff --git a/exploits/2022/CVE-2022-44268.json b/exploits/2022/CVE-2022-44268.json new file mode 100644 index 0000000..b588498 --- /dev/null +++ b/exploits/2022/CVE-2022-44268.json @@ -0,0 +1,209 @@ +[ + { + "name": "CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", + "full_name": "duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", + "html_url": "https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", + "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", + "stargazers_count": 271, + "forks_count": 40, + "created_at": "2023-02-02T15:34:28Z" + }, + { + "name": "CVE-2022-44268", + "full_name": "voidz0r/CVE-2022-44268", + "html_url": "https://github.com/voidz0r/CVE-2022-44268", + "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read", + "stargazers_count": 216, + "forks_count": 25, + "created_at": "2023-02-05T18:42:27Z" + }, + { + "name": "CVE-2022-44268", + "full_name": "kljunowsky/CVE-2022-44268", + "html_url": "https://github.com/kljunowsky/CVE-2022-44268", + "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit", + "stargazers_count": 23, + "forks_count": 7, + "created_at": "2023-02-13T02:00:51Z" + }, + { + "name": "CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment", + "full_name": "y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment", + "html_url": "https://github.com/y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment", + "description": "The vulnerable recurrence docker environment for CVE-2022-44268", + "stargazers_count": 8, + "forks_count": 2, + "created_at": "2023-02-03T08:02:28Z" + }, + { + "name": "imagemagick-CVE-2022-44268", + "full_name": "Vulnmachines/imagemagick-CVE-2022-44268", + "html_url": "https://github.com/Vulnmachines/imagemagick-CVE-2022-44268", + "description": "Imagemagick CVE-2022-44268", + "stargazers_count": 8, + "forks_count": 1, + "created_at": "2023-02-06T10:45:42Z" + }, + { + "name": "CVE-2022-44268", + "full_name": "entr0pie/CVE-2022-44268", + "html_url": "https://github.com/entr0pie/CVE-2022-44268", + "description": "PoC of Imagemagick's Arbitrary File Read", + "stargazers_count": 6, + "forks_count": 1, + "created_at": "2023-07-03T18:13:44Z" + }, + { + "name": "cve-2022-44268-detector", + "full_name": "jnschaeffer/cve-2022-44268-detector", + "html_url": "https://github.com/jnschaeffer/cve-2022-44268-detector", + "description": "Detect images that likely exploit CVE-2022-44268", + "stargazers_count": 5, + "forks_count": 1, + "created_at": "2023-02-04T01:35:08Z" + }, + { + "name": "cve-2022-44268", + "full_name": "agathanon/cve-2022-44268", + "html_url": "https://github.com/agathanon/cve-2022-44268", + "description": "Payload generator and extractor for CVE-2022-44268 written in Python.", + "stargazers_count": 4, + "forks_count": 1, + "created_at": "2023-02-03T19:02:27Z" + }, + { + "name": "CVE-2022-44268-automated", + "full_name": "PanAdamski/CVE-2022-44268-automated", + "html_url": "https://github.com/PanAdamski/CVE-2022-44268-automated", + "description": null, + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2024-08-28T11:28:34Z" + }, + { + "name": "auto-cve-2022-44268.sh", + "full_name": "narekkay/auto-cve-2022-44268.sh", + "html_url": "https://github.com/narekkay/auto-cve-2022-44268.sh", + "description": "Automating Exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read", + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2023-07-17T22:21:33Z" + }, + { + "name": "CVE-2022-44268-PoC", + "full_name": "Baikuya/CVE-2022-44268-PoC", + "html_url": "https://github.com/Baikuya/CVE-2022-44268-PoC", + "description": "CVE-2022-44268 PoC", + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2023-02-04T10:50:20Z" + }, + { + "name": "CVE-2022-44268-MagiLeak", + "full_name": "adhikara13/CVE-2022-44268-MagiLeak", + "html_url": "https://github.com/adhikara13/CVE-2022-44268-MagiLeak", + "description": "Tools for working with ImageMagick to handle arbitrary file read vulnerabilities. Generate, read, and apply profile information to PNG files using a command-line interface.", + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2023-06-25T20:52:57Z" + }, + { + "name": "CVE-2022-44268_By_Kyokito", + "full_name": "chairat095/CVE-2022-44268_By_Kyokito", + "html_url": "https://github.com/chairat095/CVE-2022-44268_By_Kyokito", + "description": "CVE-2022-44268_By_Kyokito", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2023-08-13T04:43:12Z" + }, + { + "name": "POC-CVE-2022-44268", + "full_name": "betillogalvanfbc/POC-CVE-2022-44268", + "html_url": "https://github.com/betillogalvanfbc/POC-CVE-2022-44268", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2023-03-22T21:26:20Z" + }, + { + "name": "CVE-2022-44268-Exploit", + "full_name": "bhavikmalhotra/CVE-2022-44268-Exploit", + "html_url": "https://github.com/bhavikmalhotra/CVE-2022-44268-Exploit", + "description": "Expoit for CVE-2022-44268", + "stargazers_count": 1, + "forks_count": 1, + "created_at": "2023-07-02T17:24:00Z" + }, + { + "name": "Exploit-for-ImageMagick-CVE-2022-44268", + "full_name": "atici/Exploit-for-ImageMagick-CVE-2022-44268", + "html_url": "https://github.com/atici/Exploit-for-ImageMagick-CVE-2022-44268", + "description": "A bash script for easyly exploiting ImageMagick Arbitrary File Read Vulnerability CVE-2022-44268", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2023-09-05T17:16:06Z" + }, + { + "name": "-CVE-2022-44268", + "full_name": "NataliSemi/-CVE-2022-44268", + "html_url": "https://github.com/NataliSemi/-CVE-2022-44268", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-11-14T21:54:17Z" + }, + { + "name": "cve-2022-44268", + "full_name": "Pog-Frog/cve-2022-44268", + "html_url": "https://github.com/Pog-Frog/cve-2022-44268", + "description": null, + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2023-07-14T17:46:15Z" + }, + { + "name": "CVE-2022-44268", + "full_name": "FlojBoj/CVE-2022-44268", + "html_url": "https://github.com/FlojBoj/CVE-2022-44268", + "description": "ImageMagick 7.1.0-49 vulnerable to Information Disclosure", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-09-02T09:11:45Z" + }, + { + "name": "heroku-CVE-2022-44268-reproduction", + "full_name": "nfm/heroku-CVE-2022-44268-reproduction", + "html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-02-21T01:15:07Z" + }, + { + "name": "IMAGE-MAGICK-CVE-2022-44268", + "full_name": "Vagebondcur/IMAGE-MAGICK-CVE-2022-44268", + "html_url": "https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-10-13T15:43:49Z" + }, + { + "name": "CVE-2022-44268-automated-poc", + "full_name": "Ashifcoder/CVE-2022-44268-automated-poc", + "html_url": "https://github.com/Ashifcoder/CVE-2022-44268-automated-poc", + "description": "An information disclosure vulnerability that could be exploited to read arbitrary files from a server when parsing an image in Image Magic.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-02-04T03:50:07Z" + }, + { + "name": "CVE-2022-44268-fixed-PoC", + "full_name": "CygnusX-26/CVE-2022-44268-fixed-PoC", + "html_url": "https://github.com/CygnusX-26/CVE-2022-44268-fixed-PoC", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-12-04T08:48:28Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-25194.json b/exploits/2023/CVE-2023-25194.json new file mode 100644 index 0000000..3f55cdf --- /dev/null +++ b/exploits/2023/CVE-2023-25194.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2023-25194", + "full_name": "ohnonoyesyes/CVE-2023-25194", + "html_url": "https://github.com/ohnonoyesyes/CVE-2023-25194", + "description": null, + "stargazers_count": 92, + "forks_count": 29, + "created_at": "2023-02-09T10:49:46Z" + }, + { + "name": "cve-2023-25194", + "full_name": "vulncheck-oss/cve-2023-25194", + "html_url": "https://github.com/vulncheck-oss/cve-2023-25194", + "description": "A go-exploit for Apache Druid CVE-2023-25194", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-04-17T13:36:34Z" + }, + { + "name": "CVE-2023-25194", + "full_name": "YongYe-Security/CVE-2023-25194", + "html_url": "https://github.com/YongYe-Security/CVE-2023-25194", + "description": "CVE-2023-25194 Scan", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2023-12-28T04:24:02Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-25610.json b/exploits/2023/CVE-2023-25610.json new file mode 100644 index 0000000..2a6032c --- /dev/null +++ b/exploits/2023/CVE-2023-25610.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2023-25610", + "full_name": "qi4L/CVE-2023-25610", + "html_url": "https://github.com/qi4L/CVE-2023-25610", + "description": "FortiOS 管理界面中的堆内存下溢导致远程代码执行", + "stargazers_count": 23, + "forks_count": 8, + "created_at": "2023-06-17T06:57:28Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-25725.json b/exploits/2023/CVE-2023-25725.json new file mode 100644 index 0000000..b12c853 --- /dev/null +++ b/exploits/2023/CVE-2023-25725.json @@ -0,0 +1,11 @@ +[ + { + "name": "LAB-CVE-2023-25725", + "full_name": "sgwgsw/LAB-CVE-2023-25725", + "html_url": "https://github.com/sgwgsw/LAB-CVE-2023-25725", + "description": "Lab environment to test CVE-2023-25725", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-08-23T04:32:54Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-26256.json b/exploits/2023/CVE-2023-26256.json new file mode 100644 index 0000000..ec3106f --- /dev/null +++ b/exploits/2023/CVE-2023-26256.json @@ -0,0 +1,38 @@ +[ + { + "name": "CVE-2023-26256", + "full_name": "0x7eTeam/CVE-2023-26256", + "html_url": "https://github.com/0x7eTeam/CVE-2023-26256", + "description": "CVE-2023-26255_POC,CVE-2023-26256_POC", + "stargazers_count": 31, + "forks_count": 10, + "created_at": "2023-08-24T01:57:00Z" + }, + { + "name": "CVE-2023-26256", + "full_name": "jcad123/CVE-2023-26256", + "html_url": "https://github.com/jcad123/CVE-2023-26256", + "description": "CVE-2023-26255_POC,CVE-2023-26256_POC", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2023-09-01T00:10:36Z" + }, + { + "name": "CVE-2023-26256", + "full_name": "qs119/CVE-2023-26256", + "html_url": "https://github.com/qs119/CVE-2023-26256", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-08-30T15:21:00Z" + }, + { + "name": "CVE-2023-26256", + "full_name": "xhs-d/CVE-2023-26256", + "html_url": "https://github.com/xhs-d/CVE-2023-26256", + "description": "CVE-2023-26256_POC", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-08-28T08:00:16Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-31346.json b/exploits/2023/CVE-2023-31346.json new file mode 100644 index 0000000..b2a736c --- /dev/null +++ b/exploits/2023/CVE-2023-31346.json @@ -0,0 +1,11 @@ +[ + { + "name": "cve-2023-31346-poc", + "full_name": "Freax13/cve-2023-31346-poc", + "html_url": "https://github.com/Freax13/cve-2023-31346-poc", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2023-09-03T13:54:51Z" + } +] \ No newline at end of file