Auto Update 2024/08/07 18:29:55

This commit is contained in:
motikan2010-bot 2024-08-08 03:29:55 +09:00
parent 0b6747e475
commit 0848103795
32 changed files with 132 additions and 132 deletions

View file

@ -43,7 +43,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-05T08:32:13Z",
"updated_at": "2024-08-07T14:36:36Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1969,
"watchers_count": 1969,

View file

@ -13,7 +13,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-05T08:32:13Z",
"updated_at": "2024-08-07T14:36:36Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1969,
"watchers_count": 1969,

View file

@ -43,7 +43,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-05T08:32:13Z",
"updated_at": "2024-08-07T14:36:36Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1969,
"watchers_count": 1969,

View file

@ -552,23 +552,23 @@
"subscribers_count": 0
},
{
"id": 818312200,
"id": 839459028,
"name": "CVE-2017-7269",
"full_name": "OmarSuarezDoro\/CVE-2017-7269",
"full_name": "VanishedPeople\/CVE-2017-7269",
"owner": {
"login": "OmarSuarezDoro",
"id": 91568642,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91568642?v=4",
"html_url": "https:\/\/github.com\/OmarSuarezDoro"
"login": "VanishedPeople",
"id": 155242438,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155242438?v=4",
"html_url": "https:\/\/github.com\/VanishedPeople"
},
"html_url": "https:\/\/github.com\/OmarSuarezDoro\/CVE-2017-7269",
"description": "This repository contain an script to exploit CVE-2017-7269",
"html_url": "https:\/\/github.com\/VanishedPeople\/CVE-2017-7269",
"description": null,
"fork": false,
"created_at": "2024-06-21T15:05:15Z",
"updated_at": "2024-06-26T10:39:47Z",
"pushed_at": "2024-06-21T15:07:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"created_at": "2024-08-07T16:45:02Z",
"updated_at": "2024-08-07T17:34:51Z",
"pushed_at": "2024-08-07T17:34:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -577,8 +577,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -557,7 +557,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-05T08:32:13Z",
"updated_at": "2024-08-07T14:36:36Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1969,
"watchers_count": 1969,

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-07T08:42:17Z",
"updated_at": "2024-08-07T15:46:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4077,
"watchers_count": 4077,
"stargazers_count": 4079,
"watchers_count": 4079,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4077,
"watchers": 4079,
"score": 0,
"subscribers_count": 151
},

View file

@ -103,10 +103,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-08-04T08:44:11Z",
"updated_at": "2024-08-07T14:37:03Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 945,
"watchers_count": 945,
"stargazers_count": 944,
"watchers_count": 944,
"has_discussions": false,
"forks_count": 179,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 179,
"watchers": 945,
"watchers": 944,
"score": 0,
"subscribers_count": 18
},
@ -193,7 +193,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-05T08:32:13Z",
"updated_at": "2024-08-07T14:36:36Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1969,
"watchers_count": 1969,

View file

@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-08-05T08:28:18Z",
"updated_at": "2024-08-07T15:22:31Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 619,
"watchers_count": 619,
"stargazers_count": 620,
"watchers_count": 620,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 619,
"watchers": 620,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-07T08:42:17Z",
"updated_at": "2024-08-07T15:46:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4077,
"watchers_count": 4077,
"stargazers_count": 4079,
"watchers_count": 4079,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4077,
"watchers": 4079,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,7 +13,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-05T08:32:13Z",
"updated_at": "2024-08-07T14:36:36Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1969,
"watchers_count": 1969,

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day",
"fork": false,
"created_at": "2021-11-28T09:48:36Z",
"updated_at": "2024-06-01T20:27:04Z",
"updated_at": "2024-08-07T12:49:22Z",
"pushed_at": "2022-02-21T08:30:22Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 2
}

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-08-06T08:39:31Z",
"updated_at": "2024-08-07T17:10:05Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1565,
"watchers_count": 1565,
"stargazers_count": 1566,
"watchers_count": 1566,
"has_discussions": false,
"forks_count": 481,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 481,
"watchers": 1565,
"watchers": 1566,
"score": 0,
"subscribers_count": 28
},
@ -493,10 +493,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-08-04T18:35:52Z",
"updated_at": "2024-08-07T17:10:16Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 794,
"watchers_count": 794,
"stargazers_count": 795,
"watchers_count": 795,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 169,
"watchers": 794,
"watchers": 795,
"score": 0,
"subscribers_count": 19
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-08-05T12:29:19Z",
"updated_at": "2024-08-07T13:07:05Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1782,
"watchers_count": 1782,
"stargazers_count": 1784,
"watchers_count": 1784,
"has_discussions": false,
"forks_count": 527,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 527,
"watchers": 1782,
"watchers": 1784,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,8 +13,8 @@
"description": "Demonstrate some functionalities of Morion by generating an exploit for CVE-2022-27646 (stack buffer overflow on Netgear R6700v3 routers).",
"fork": false,
"created_at": "2023-06-01T05:10:56Z",
"updated_at": "2024-07-15T05:57:52Z",
"pushed_at": "2024-07-15T14:43:27Z",
"updated_at": "2024-08-07T14:38:09Z",
"pushed_at": "2024-08-07T14:43:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -18,13 +18,13 @@
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 46,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Exploit script for CVE-2023-24249 - a vulnerability allowing remote code execution via file upload and command injection.",
"fork": false,
"created_at": "2024-08-07T04:36:44Z",
"updated_at": "2024-08-07T04:43:19Z",
"updated_at": "2024-08-07T13:19:36Z",
"pushed_at": "2024-08-07T04:41:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2024-05-10T10:49:30Z",
"updated_at": "2024-08-07T15:11:24Z",
"pushed_at": "2024-03-15T02:02:35Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-08-01T07:54:32Z",
"updated_at": "2024-08-07T14:38:53Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 196,
"watchers": 197,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-08-07T11:53:10Z",
"updated_at": "2024-08-07T12:40:16Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 185,
"watchers": 186,
"score": 0,
"subscribers_count": 5
},
@ -73,10 +73,10 @@
"description": "利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。",
"fork": false,
"created_at": "2024-07-03T10:29:06Z",
"updated_at": "2024-08-06T05:25:02Z",
"updated_at": "2024-08-07T14:53:41Z",
"pushed_at": "2024-07-12T02:59:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-08-06T16:56:21Z",
"updated_at": "2024-08-07T12:55:15Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 254,
"watchers_count": 254,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 252,
"watchers": 254,
"score": 0,
"subscribers_count": 3
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 656,
"watchers_count": 656,
"has_discussions": false,
"forks_count": 145,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 145,
"forks": 146,
"watchers": 656,
"score": 0,
"subscribers_count": 10

View file

@ -13,12 +13,12 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false,
"created_at": "2024-05-31T20:11:37Z",
"updated_at": "2024-07-18T04:27:14Z",
"updated_at": "2024-08-07T12:47:26Z",
"pushed_at": "2024-06-08T09:12:43Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 13,
"watchers": 53,
"forks": 14,
"watchers": 54,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-08-01T03:25:52Z",
"updated_at": "2024-08-07T12:36:29Z",
"pushed_at": "2024-07-29T12:20:50Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 345,
"watchers": 346,
"score": 0,
"subscribers_count": 7
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 84,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-08-07T12:16:21Z",
"updated_at": "2024-08-07T14:41:23Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 187,
"watchers": 188,
"score": 0,
"subscribers_count": 3
},
@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-08-06T23:20:11Z",
"updated_at": "2024-08-07T15:08:58Z",
"pushed_at": "2024-07-18T01:28:46Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 285,
"watchers": 286,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Apache OfBiz vulns",
"fork": false,
"created_at": "2024-04-10T13:22:11Z",
"updated_at": "2024-08-07T05:22:02Z",
"updated_at": "2024-08-07T13:38:23Z",
"pushed_at": "2024-08-05T06:40:47Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "This is a small proof of concept for CVE-2024-41958",
"fork": false,
"created_at": "2024-08-05T19:10:08Z",
"updated_at": "2024-08-06T23:19:33Z",
"updated_at": "2024-08-07T14:00:57Z",
"pushed_at": "2024-08-05T20:22:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -163,19 +163,19 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-08-05T17:01:03Z",
"updated_at": "2024-08-07T12:42:53Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"has_discussions": false,
"forks_count": 39,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 184,
"forks": 41,
"watchers": 185,
"score": 0,
"subscribers_count": 4
},

View file

@ -193,10 +193,10 @@
"description": "CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.",
"fork": false,
"created_at": "2024-07-28T06:51:33Z",
"updated_at": "2024-08-03T03:09:59Z",
"updated_at": "2024-08-07T14:31:30Z",
"pushed_at": "2024-08-03T03:09:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "Calibre 远程代码执行CVE-2024-6782Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.",
"fork": false,
"created_at": "2024-08-06T15:31:48Z",
"updated_at": "2024-08-07T08:09:49Z",
"updated_at": "2024-08-07T13:32:43Z",
"pushed_at": "2024-08-06T15:35:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "An Vulnerability detection and Exploitation tool for CVE-2024-7339",
"fork": false,
"created_at": "2024-08-05T16:26:18Z",
"updated_at": "2024-08-07T02:54:22Z",
"updated_at": "2024-08-07T18:33:15Z",
"pushed_at": "2024-08-05T16:41:15Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -39100,7 +39100,7 @@
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
- [Cappricio-Securities/CVE-2017-7269](https://github.com/Cappricio-Securities/CVE-2017-7269)
- [OmarSuarezDoro/CVE-2017-7269](https://github.com/OmarSuarezDoro/CVE-2017-7269)
- [VanishedPeople/CVE-2017-7269](https://github.com/VanishedPeople/CVE-2017-7269)
### CVE-2017-7308 (2017-03-29)