272 lines
No EOL
9.4 KiB
JSON
272 lines
No EOL
9.4 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2023-38831-winrar-exploit",
|
||
"full_name": "b1tg/CVE-2023-38831-winrar-exploit",
|
||
"html_url": "https://github.com/b1tg/CVE-2023-38831-winrar-exploit",
|
||
"description": "CVE-2023-38831 winrar exploit generator",
|
||
"stargazers_count": 786,
|
||
"forks_count": 140,
|
||
"created_at": "2023-08-25T09:44:08Z"
|
||
},
|
||
{
|
||
"name": "Windows_LPE_AFD_CVE-2023-21768",
|
||
"full_name": "chompie1337/Windows_LPE_AFD_CVE-2023-21768",
|
||
"html_url": "https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768",
|
||
"description": "LPE exploit for CVE-2023-21768",
|
||
"stargazers_count": 486,
|
||
"forks_count": 166,
|
||
"created_at": "2023-03-07T23:00:27Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-0386",
|
||
"full_name": "xkaneiki/CVE-2023-0386",
|
||
"html_url": "https://github.com/xkaneiki/CVE-2023-0386",
|
||
"description": "CVE-2023-0386在ubuntu22.04上的提权",
|
||
"stargazers_count": 389,
|
||
"forks_count": 63,
|
||
"created_at": "2023-05-05T03:02:13Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-4911",
|
||
"full_name": "leesh3288/CVE-2023-4911",
|
||
"html_url": "https://github.com/leesh3288/CVE-2023-4911",
|
||
"description": "PoC for CVE-2023-4911",
|
||
"stargazers_count": 384,
|
||
"forks_count": 59,
|
||
"created_at": "2023-10-04T14:12:16Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-32233",
|
||
"full_name": "Liuk3r/CVE-2023-32233",
|
||
"html_url": "https://github.com/Liuk3r/CVE-2023-32233",
|
||
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
|
||
"stargazers_count": 371,
|
||
"forks_count": 77,
|
||
"created_at": "2023-05-16T03:06:40Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-POC-Powershell",
|
||
"full_name": "api0cradle/CVE-2023-23397-POC-Powershell",
|
||
"html_url": "https://github.com/api0cradle/CVE-2023-23397-POC-Powershell",
|
||
"description": null,
|
||
"stargazers_count": 343,
|
||
"forks_count": 62,
|
||
"created_at": "2023-03-16T19:43:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-4863",
|
||
"full_name": "mistymntncop/CVE-2023-4863",
|
||
"html_url": "https://github.com/mistymntncop/CVE-2023-4863",
|
||
"description": null,
|
||
"stargazers_count": 316,
|
||
"forks_count": 47,
|
||
"created_at": "2023-09-21T05:22:51Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-21752",
|
||
"full_name": "Wh04m1001/CVE-2023-21752",
|
||
"html_url": "https://github.com/Wh04m1001/CVE-2023-21752",
|
||
"description": null,
|
||
"stargazers_count": 314,
|
||
"forks_count": 65,
|
||
"created_at": "2023-01-10T15:59:26Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-25690-POC",
|
||
"full_name": "dhmosfunk/CVE-2023-25690-POC",
|
||
"html_url": "https://github.com/dhmosfunk/CVE-2023-25690-POC",
|
||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||
"stargazers_count": 280,
|
||
"forks_count": 38,
|
||
"created_at": "2023-05-22T03:06:31Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-21608",
|
||
"full_name": "hacksysteam/CVE-2023-21608",
|
||
"html_url": "https://github.com/hacksysteam/CVE-2023-21608",
|
||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||
"stargazers_count": 269,
|
||
"forks_count": 59,
|
||
"created_at": "2023-01-30T12:57:48Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-24055_PoC",
|
||
"full_name": "alt3kx/CVE-2023-24055_PoC",
|
||
"html_url": "https://github.com/alt3kx/CVE-2023-24055_PoC",
|
||
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
|
||
"stargazers_count": 253,
|
||
"forks_count": 38,
|
||
"created_at": "2023-01-25T03:21:42Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-7028",
|
||
"full_name": "Vozec/CVE-2023-7028",
|
||
"html_url": "https://github.com/Vozec/CVE-2023-7028",
|
||
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
|
||
"stargazers_count": 239,
|
||
"forks_count": 41,
|
||
"created_at": "2024-01-12T18:29:27Z"
|
||
},
|
||
{
|
||
"name": "Weblogic-CVE-2023-21839",
|
||
"full_name": "DXask88MA/Weblogic-CVE-2023-21839",
|
||
"html_url": "https://github.com/DXask88MA/Weblogic-CVE-2023-21839",
|
||
"description": null,
|
||
"stargazers_count": 234,
|
||
"forks_count": 45,
|
||
"created_at": "2023-02-21T16:08:56Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-36874",
|
||
"full_name": "Wh04m1001/CVE-2023-36874",
|
||
"html_url": "https://github.com/Wh04m1001/CVE-2023-36874",
|
||
"description": null,
|
||
"stargazers_count": 233,
|
||
"forks_count": 46,
|
||
"created_at": "2023-08-23T12:07:40Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-20887",
|
||
"full_name": "sinsinology/CVE-2023-20887",
|
||
"html_url": "https://github.com/sinsinology/CVE-2023-20887",
|
||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||
"stargazers_count": 231,
|
||
"forks_count": 43,
|
||
"created_at": "2023-06-13T13:17:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-44487",
|
||
"full_name": "bcdannyboy/CVE-2023-44487",
|
||
"html_url": "https://github.com/bcdannyboy/CVE-2023-44487",
|
||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||
"stargazers_count": 230,
|
||
"forks_count": 48,
|
||
"created_at": "2023-10-10T14:20:42Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-29357",
|
||
"full_name": "Chocapikk/CVE-2023-29357",
|
||
"html_url": "https://github.com/Chocapikk/CVE-2023-29357",
|
||
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
|
||
"stargazers_count": 230,
|
||
"forks_count": 31,
|
||
"created_at": "2023-09-26T16:18:41Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-3519",
|
||
"full_name": "BishopFox/CVE-2023-3519",
|
||
"html_url": "https://github.com/BishopFox/CVE-2023-3519",
|
||
"description": "RCE exploit for CVE-2023-3519",
|
||
"stargazers_count": 223,
|
||
"forks_count": 42,
|
||
"created_at": "2023-07-21T20:17:43Z"
|
||
},
|
||
{
|
||
"name": "Apache-Dubbo-CVE-2023-23638-exp",
|
||
"full_name": "YYHYlh/Apache-Dubbo-CVE-2023-23638-exp",
|
||
"html_url": "https://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp",
|
||
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
|
||
"stargazers_count": 217,
|
||
"forks_count": 30,
|
||
"created_at": "2023-05-11T07:37:52Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-0179-PoC",
|
||
"full_name": "TurtleARM/CVE-2023-0179-PoC",
|
||
"html_url": "https://github.com/TurtleARM/CVE-2023-0179-PoC",
|
||
"description": null,
|
||
"stargazers_count": 212,
|
||
"forks_count": 34,
|
||
"created_at": "2023-01-21T01:02:01Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-4357-Chrome-XXE",
|
||
"full_name": "xcanwin/CVE-2023-4357-Chrome-XXE",
|
||
"html_url": "https://github.com/xcanwin/CVE-2023-4357-Chrome-XXE",
|
||
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||
"stargazers_count": 208,
|
||
"forks_count": 34,
|
||
"created_at": "2023-11-17T10:32:31Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-46747-RCE",
|
||
"full_name": "W01fh4cker/CVE-2023-46747-RCE",
|
||
"html_url": "https://github.com/W01fh4cker/CVE-2023-46747-RCE",
|
||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||
"stargazers_count": 204,
|
||
"forks_count": 46,
|
||
"created_at": "2023-11-01T09:31:05Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-36874_BOF",
|
||
"full_name": "Octoberfest7/CVE-2023-36874_BOF",
|
||
"html_url": "https://github.com/Octoberfest7/CVE-2023-36874_BOF",
|
||
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
|
||
"stargazers_count": 204,
|
||
"forks_count": 27,
|
||
"created_at": "2023-08-24T22:24:34Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-0179-PoC",
|
||
"full_name": "H4K6/CVE-2023-0179-PoC",
|
||
"html_url": "https://github.com/H4K6/CVE-2023-0179-PoC",
|
||
"description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
|
||
"stargazers_count": 202,
|
||
"forks_count": 26,
|
||
"created_at": "2023-03-16T02:20:52Z"
|
||
},
|
||
{
|
||
"name": "POC-for-CVE-2023-41993",
|
||
"full_name": "po6ix/POC-for-CVE-2023-41993",
|
||
"html_url": "https://github.com/po6ix/POC-for-CVE-2023-41993",
|
||
"description": null,
|
||
"stargazers_count": 200,
|
||
"forks_count": 36,
|
||
"created_at": "2023-10-15T12:14:18Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-28252",
|
||
"full_name": "fortra/CVE-2023-28252",
|
||
"html_url": "https://github.com/fortra/CVE-2023-28252",
|
||
"description": null,
|
||
"stargazers_count": 177,
|
||
"forks_count": 45,
|
||
"created_at": "2023-06-27T12:22:05Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-27326",
|
||
"full_name": "Impalabs/CVE-2023-27326",
|
||
"html_url": "https://github.com/Impalabs/CVE-2023-27326",
|
||
"description": "VM Escape for Parallels Desktop <18.1.1",
|
||
"stargazers_count": 170,
|
||
"forks_count": 24,
|
||
"created_at": "2023-03-20T11:47:54Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-4911",
|
||
"full_name": "RickdeJager/CVE-2023-4911",
|
||
"html_url": "https://github.com/RickdeJager/CVE-2023-4911",
|
||
"description": "CVE-2023-4911 proof of concept",
|
||
"stargazers_count": 167,
|
||
"forks_count": 31,
|
||
"created_at": "2023-10-04T14:32:49Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-25157",
|
||
"full_name": "win3zz/CVE-2023-25157",
|
||
"html_url": "https://github.com/win3zz/CVE-2023-25157",
|
||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||
"stargazers_count": 166,
|
||
"forks_count": 35,
|
||
"created_at": "2023-06-06T14:05:09Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-36745",
|
||
"full_name": "N1k0la-T/CVE-2023-36745",
|
||
"html_url": "https://github.com/N1k0la-T/CVE-2023-36745",
|
||
"description": null,
|
||
"stargazers_count": 162,
|
||
"forks_count": 53,
|
||
"created_at": "2023-10-23T19:06:36Z"
|
||
}
|
||
] |