Auto Update 2024/12/25 12:31:49

This commit is contained in:
motikan2010-bot 2024-12-25 21:31:49 +09:00
parent 30a8fe023e
commit 07fbf7908c
39 changed files with 134 additions and 134 deletions

View file

@ -97,10 +97,10 @@
"description": "CVE-2014-4210 SSRF PORTSCANNER PoC",
"fork": false,
"created_at": "2020-07-21T03:45:30Z",
"updated_at": "2024-12-20T03:30:57Z",
"updated_at": "2024-12-25T10:17:06Z",
"pushed_at": "2020-07-21T03:46:09Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -109,7 +109,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
@ -128,10 +128,10 @@
"description": "Weblogic SearchPublicRegistries SSRF(CVE-2014-4210) Exploit Script based on Python3",
"fork": false,
"created_at": "2020-11-19T16:06:57Z",
"updated_at": "2024-12-20T03:30:45Z",
"updated_at": "2024-12-25T10:17:14Z",
"pushed_at": "2020-11-20T05:55:15Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -140,7 +140,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-20T07:25:44Z",
"updated_at": "2024-12-25T08:49:58Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 163,
"watchers": 164,
"score": 0,
"subscribers_count": 2
},

View file

@ -33,15 +33,15 @@
{
"id": 80717942,
"name": "extra_recipe",
"full_name": "JackBro\/extra_recipe",
"full_name": "ldebug\/extra_recipe",
"owner": {
"login": "JackBro",
"login": "ldebug",
"id": 21210712,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4",
"html_url": "https:\/\/github.com\/JackBro",
"html_url": "https:\/\/github.com\/ldebug",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
"html_url": "https:\/\/github.com\/ldebug\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
"fork": false,
"created_at": "2017-02-02T11:16:38Z",

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2018-07-02T02:21:28Z",
"updated_at": "2024-08-26T18:38:39Z",
"updated_at": "2024-12-25T07:36:03Z",
"pushed_at": "2019-05-09T07:07:25Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 5
},

View file

@ -3024,10 +3024,10 @@
"description": "CVE-2019-0708 (BlueKeep)",
"fork": false,
"created_at": "2019-12-07T10:13:11Z",
"updated_at": "2024-08-12T19:55:32Z",
"updated_at": "2024-12-25T11:28:16Z",
"pushed_at": "2020-07-07T15:28:13Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -3036,7 +3036,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 106,
"watchers": 105,
"score": 0,
"subscribers_count": 5
},

View file

@ -45,10 +45,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2024-11-18T08:00:32Z",
"updated_at": "2024-12-25T09:28:14Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 169,
"watchers": 170,
"score": 0,
"subscribers_count": 5
},

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-20T07:25:44Z",
"updated_at": "2024-12-25T08:49:58Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 163,
"watchers": 164,
"score": 0,
"subscribers_count": 2
}

View file

@ -93,10 +93,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2024-12-22T13:59:45Z",
"updated_at": "2024-12-25T11:43:15Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 487,
"watchers_count": 487,
"stargazers_count": 488,
"watchers_count": 488,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -107,7 +107,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 487,
"watchers": 488,
"score": 0,
"subscribers_count": 8
},
@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-25T02:14:55Z",
"updated_at": "2024-12-25T09:32:14Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1348,
"watchers_count": 1348,
"stargazers_count": 1349,
"watchers_count": 1349,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1348,
"watchers": 1349,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2024-11-18T08:00:32Z",
"updated_at": "2024-12-25T09:28:14Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 169,
"watchers": 170,
"score": 0,
"subscribers_count": 5
},

View file

@ -7264,7 +7264,7 @@
"fork": false,
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2023-06-22T04:46:02Z",
"pushed_at": "2024-11-25T05:57:14Z",
"pushed_at": "2024-12-25T06:55:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -1871,10 +1871,10 @@
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
"fork": false,
"created_at": "2022-06-04T08:31:32Z",
"updated_at": "2024-08-17T10:29:15Z",
"updated_at": "2024-12-25T08:00:52Z",
"pushed_at": "2022-06-16T17:14:10Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1891,7 +1891,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-15T19:37:35Z",
"updated_at": "2024-11-27T09:45:32Z",
"updated_at": "2024-12-25T09:16:05Z",
"pushed_at": "2022-04-22T17:55:37Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-12T04:47:02Z",
"updated_at": "2024-12-16T06:53:25Z",
"updated_at": "2024-12-25T09:52:56Z",
"pushed_at": "2024-03-18T07:32:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-25T02:14:55Z",
"updated_at": "2024-12-25T09:32:14Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1348,
"watchers_count": 1348,
"stargazers_count": 1349,
"watchers_count": 1349,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1348,
"watchers": 1349,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,19 +14,19 @@
"description": "Exploit for CVE-2022-29582 targeting Google's Kernel CTF",
"fork": false,
"created_at": "2022-08-04T15:29:04Z",
"updated_at": "2024-12-02T23:35:27Z",
"updated_at": "2024-12-25T09:00:31Z",
"pushed_at": "2022-08-08T04:13:33Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 71,
"forks": 11,
"watchers": 72,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
"fork": false,
"created_at": "2024-01-16T08:46:21Z",
"updated_at": "2024-09-02T04:23:53Z",
"updated_at": "2024-12-25T07:14:03Z",
"pushed_at": "2024-01-23T09:57:31Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},

View file

@ -265,8 +265,8 @@
"description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))",
"fork": false,
"created_at": "2024-12-11T07:38:22Z",
"updated_at": "2024-12-23T10:26:36Z",
"pushed_at": "2024-12-23T10:26:32Z",
"updated_at": "2024-12-25T12:05:52Z",
"pushed_at": "2024-12-25T12:05:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-16T19:36:50Z",
"updated_at": "2024-05-17T14:24:09Z",
"updated_at": "2024-12-25T09:16:44Z",
"pushed_at": "2024-02-16T19:39:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-24T20:51:19Z",
"updated_at": "2024-12-25T11:49:55Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2309,
"watchers_count": 2309,
"stargazers_count": 2310,
"watchers_count": 2310,
"has_discussions": false,
"forks_count": 299,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 2309,
"watchers": 2310,
"score": 0,
"subscribers_count": 26
},

View file

@ -326,6 +326,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-12-10T03:08:06Z",
"updated_at": "2024-12-25T07:57:40Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 8
},

View file

@ -138,10 +138,10 @@
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
"fork": false,
"created_at": "2024-03-17T09:15:22Z",
"updated_at": "2024-10-29T16:36:33Z",
"updated_at": "2024-12-25T11:30:36Z",
"pushed_at": "2024-03-17T09:20:35Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
"updated_at": "2024-12-15T22:44:06Z",
"updated_at": "2024-12-25T07:47:07Z",
"pushed_at": "2024-02-25T21:50:09Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 3
},

View file

@ -152,7 +152,7 @@
"forks": 7,
"watchers": 35,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 871953279,

View file

@ -14,10 +14,10 @@
"description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2024-06-12T13:53:32Z",
"updated_at": "2024-12-07T00:01:48Z",
"updated_at": "2024-12-25T11:31:21Z",
"pushed_at": "2024-06-12T14:04:39Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 5
},

View file

@ -121,7 +121,7 @@
"forks": 31,
"watchers": 430,
"score": 0,
"subscribers_count": 20
"subscribers_count": 21
},
{
"id": 834461917,

View file

@ -76,10 +76,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-12-22T02:46:53Z",
"updated_at": "2024-12-25T08:56:18Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 519,
"watchers_count": 519,
"stargazers_count": 520,
"watchers_count": 520,
"has_discussions": false,
"forks_count": 144,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 144,
"watchers": 519,
"watchers": 520,
"score": 0,
"subscribers_count": 3
},

View file

@ -131,6 +131,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-12-24T15:47:54Z",
"updated_at": "2024-12-25T08:57:08Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 640,
"watchers_count": 640,
"stargazers_count": 641,
"watchers_count": 641,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 640,
"watchers": 641,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-21T07:19:27Z",
"updated_at": "2024-12-25T10:13:21Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 0
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 91,
"score": 0,
"subscribers_count": 1

View file

@ -28,7 +28,7 @@
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 908053971,

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-25T03:57:03Z",
"updated_at": "2024-12-25T10:03:11Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 27,
"watchers": 32,
"score": 0,
"subscribers_count": 2
},
@ -262,8 +262,8 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-25T02:43:51Z",
"pushed_at": "2024-12-25T02:43:47Z",
"updated_at": "2024-12-25T07:54:45Z",
"pushed_at": "2024-12-25T07:54:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -50,7 +50,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -62,7 +62,7 @@
"rce-exploit"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -45,19 +45,19 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-24T04:05:37Z",
"updated_at": "2024-12-25T09:09:58Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 70,
"forks": 29,
"watchers": 71,
"score": 0,
"subscribers_count": 3
},

View file

@ -42883,7 +42883,7 @@
</code>
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
- [ldebug/extra_recipe](https://github.com/ldebug/extra_recipe)
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)