Auto Update 2024/11/03 12:30:55

This commit is contained in:
motikan2010-bot 2024-11-03 21:30:55 +09:00
parent 1054a10b49
commit 09cef87527
37 changed files with 152 additions and 216 deletions

View file

@ -14,10 +14,10 @@
"description": "A CVE-2012-2688 shell",
"fork": false,
"created_at": "2020-03-06T16:12:39Z",
"updated_at": "2024-06-04T01:51:24Z",
"updated_at": "2024-11-03T11:26:43Z",
"pushed_at": "2020-03-18T16:06:39Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -417,10 +417,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-03T02:32:26Z",
"updated_at": "2024-11-03T11:14:26Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 89,
"watchers": 91,
"score": 0,
"subscribers_count": 2
}

View file

@ -15,7 +15,7 @@
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-11-01T10:39:34Z",
"pushed_at": "2024-11-01T10:39:30Z",
"pushed_at": "2024-11-03T10:58:20Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -267,19 +267,19 @@
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false,
"created_at": "2021-04-21T16:42:31Z",
"updated_at": "2024-09-22T07:22:23Z",
"updated_at": "2024-11-03T09:22:28Z",
"pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 45,
"forks": 21,
"watchers": 46,
"score": 0,
"subscribers_count": 3
},

View file

@ -76,10 +76,10 @@
"description": "exp of CVE-2018-15982",
"fork": false,
"created_at": "2018-12-10T04:53:31Z",
"updated_at": "2024-08-12T19:43:55Z",
"updated_at": "2024-11-03T09:27:33Z",
"pushed_at": "2019-01-04T09:29:01Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 180,
"watchers": 181,
"score": 0,
"subscribers_count": 7
},

View file

@ -81,13 +81,13 @@
"stargazers_count": 198,
"watchers_count": 198,
"has_discussions": false,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 198,
"score": 0,
"subscribers_count": 8

View file

@ -76,10 +76,10 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2024-11-03T03:22:23Z",
"updated_at": "2024-11-03T06:54:00Z",
"pushed_at": "2022-09-01T06:33:36Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 177,
"watchers": 178,
"score": 0,
"subscribers_count": 7
},

View file

@ -950,10 +950,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-03T02:32:26Z",
"updated_at": "2024-11-03T11:14:26Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -970,7 +970,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 89,
"watchers": 91,
"score": 0,
"subscribers_count": 2
}

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-11-01T15:04:16Z",
"updated_at": "2024-11-03T07:21:18Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 796,
"watchers_count": 796,
"stargazers_count": 797,
"watchers_count": 797,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
"watchers": 796,
"watchers": 797,
"score": 0,
"subscribers_count": 13
},

View file

@ -1194,10 +1194,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-11-02T06:53:10Z",
"updated_at": "2024-11-03T06:49:43Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 547,
"watchers_count": 547,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -1206,7 +1206,7 @@
"topics": [],
"visibility": "public",
"forks": 141,
"watchers": 546,
"watchers": 547,
"score": 0,
"subscribers_count": 15
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"unisoc"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 37,
"score": 0,
"subscribers_count": 4

View file

@ -45,10 +45,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
"updated_at": "2024-11-01T00:26:08Z",
"updated_at": "2024-11-03T09:13:49Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
"fork": false,
"created_at": "2023-03-27T08:53:04Z",
"updated_at": "2024-10-02T09:35:45Z",
"updated_at": "2024-11-03T11:51:04Z",
"pushed_at": "2023-04-04T05:26:59Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 302,
"watchers": 303,
"score": 0,
"subscribers_count": 3
}

View file

@ -419,8 +419,8 @@
"description": null,
"fork": false,
"created_at": "2023-11-20T11:57:24Z",
"updated_at": "2024-10-09T11:24:26Z",
"pushed_at": "2024-10-09T11:24:23Z",
"updated_at": "2024-11-03T11:40:26Z",
"pushed_at": "2024-11-03T11:40:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -200,8 +200,8 @@
"description": "CVE-2024-23113-Private-POC",
"fork": false,
"created_at": "2024-10-27T14:31:05Z",
"updated_at": "2024-11-03T00:41:15Z",
"pushed_at": "2024-10-31T17:52:19Z",
"updated_at": "2024-11-03T12:29:02Z",
"pushed_at": "2024-11-03T12:28:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -162,15 +162,15 @@
{
"id": 786291689,
"name": "CVE-2024-24576-PoC-Python",
"full_name": "mishalhossin\/CVE-2024-24576-PoC-Python",
"full_name": "mishl-dev\/CVE-2024-24576-PoC-Python",
"owner": {
"login": "mishalhossin",
"login": "mishl-dev",
"id": 91066601,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91066601?v=4",
"html_url": "https:\/\/github.com\/mishalhossin",
"html_url": "https:\/\/github.com\/mishl-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mishalhossin\/CVE-2024-24576-PoC-Python",
"html_url": "https:\/\/github.com\/mishl-dev\/CVE-2024-24576-PoC-Python",
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24576",
"fork": false,
"created_at": "2024-04-14T02:10:55Z",

View file

@ -45,10 +45,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-10-22T14:29:11Z",
"updated_at": "2024-11-03T09:01:33Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 1
},

View file

@ -122,36 +122,5 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 879294178,
"name": "CVE-2024-28987",
"full_name": "hatvix1\/CVE-2024-28987",
"owner": {
"login": "hatvix1",
"id": 186392026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
"html_url": "https:\/\/github.com\/hatvix1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-28987",
"description": null,
"fork": false,
"created_at": "2024-10-27T14:31:40Z",
"updated_at": "2024-11-03T00:41:14Z",
"pushed_at": "2024-11-01T12:59:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -983,10 +983,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-11-02T08:44:49Z",
"updated_at": "2024-11-03T09:28:40Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3491,
"watchers_count": 3491,
"stargazers_count": 3492,
"watchers_count": 3492,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -995,7 +995,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 3491,
"watchers": 3492,
"score": 0,
"subscribers_count": 38
},

View file

@ -29,5 +29,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 882582274,
"name": "CVE-2024-37383-exploit",
"full_name": "amirzargham\/CVE-2024-37383-exploit",
"owner": {
"login": "amirzargham",
"id": 133110721,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133110721?v=4",
"html_url": "https:\/\/github.com\/amirzargham",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amirzargham\/CVE-2024-37383-exploit",
"description": "Roundcube mail server exploit for CVE-2024-37383 (Stored XSS)",
"fork": false,
"created_at": "2024-11-03T07:16:46Z",
"updated_at": "2024-11-03T07:24:35Z",
"pushed_at": "2024-11-03T07:24:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -358,19 +358,19 @@
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
"fork": false,
"created_at": "2024-08-28T08:57:23Z",
"updated_at": "2024-09-24T10:44:23Z",
"updated_at": "2024-11-03T11:48:44Z",
"pushed_at": "2024-08-28T09:02:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"forks": 6,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -451,19 +451,19 @@
"description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
"fork": false,
"created_at": "2024-09-01T09:20:02Z",
"updated_at": "2024-10-21T08:10:12Z",
"updated_at": "2024-11-03T11:52:16Z",
"pushed_at": "2024-09-08T07:12:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,20 +14,20 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-03T05:05:20Z",
"updated_at": "2024-11-03T11:04:21Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"forks": 1,
"watchers": 12,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC honeypot for detecting exploit attempts against CVE-2024-47177",
"fork": false,
"created_at": "2024-09-27T05:18:23Z",
"updated_at": "2024-10-17T15:31:58Z",
"updated_at": "2024-11-03T07:09:28Z",
"pushed_at": "2024-09-30T04:36:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -61,37 +61,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 879294291,
"name": "CVE-2024-47575",
"full_name": "hatvix1\/CVE-2024-47575",
"owner": {
"login": "hatvix1",
"id": 186392026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
"html_url": "https:\/\/github.com\/hatvix1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-47575",
"description": null,
"fork": false,
"created_at": "2024-10-27T14:31:58Z",
"updated_at": "2024-11-03T00:41:14Z",
"pushed_at": "2024-10-31T18:01:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 879709998,
"name": "CVE-2024-47575",
@ -185,37 +154,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 881894297,
"name": "CVE-2024-47575",
"full_name": "Fruktolzzz\/CVE-2024-47575",
"owner": {
"login": "Fruktolzzz",
"id": 95181057,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95181057?v=4",
"html_url": "https:\/\/github.com\/Fruktolzzz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Fruktolzzz\/CVE-2024-47575",
"description": "CVE-2024-47575: FortiManager Missing Authentication",
"fork": false,
"created_at": "2024-11-01T13:04:35Z",
"updated_at": "2024-11-01T13:10:11Z",
"pushed_at": "2024-11-01T13:10:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 881918245,
"name": "CVE-2024-47575",

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,8 +14,8 @@
"description": "Proof of concept of multiple Stored Cross-Site Scripting (XSS) vulnerabilities discovered in ACI Worldwide Proactive Risk Manager v 9.1.1.0",
"fork": false,
"created_at": "2024-10-27T08:29:59Z",
"updated_at": "2024-10-27T09:03:10Z",
"pushed_at": "2024-10-27T09:00:14Z",
"updated_at": "2024-11-03T09:33:37Z",
"pushed_at": "2024-11-03T09:33:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,8 +14,8 @@
"description": null,
"fork": false,
"created_at": "2024-10-30T09:53:42Z",
"updated_at": "2024-10-30T09:55:14Z",
"pushed_at": "2024-10-30T09:55:09Z",
"updated_at": "2024-11-03T11:49:39Z",
"pushed_at": "2024-11-03T11:49:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Research and PoC for CVE-2024-6386",
"fork": false,
"created_at": "2024-09-05T14:44:36Z",
"updated_at": "2024-09-16T09:45:12Z",
"updated_at": "2024-11-03T07:36:10Z",
"pushed_at": "2024-09-08T19:09:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -502,10 +502,10 @@
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
"fork": false,
"created_at": "2024-07-02T02:51:37Z",
"updated_at": "2024-09-03T00:09:52Z",
"updated_at": "2024-11-03T07:18:48Z",
"pushed_at": "2024-07-02T03:23:00Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -514,7 +514,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 0
},
@ -1421,10 +1421,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-10-24T15:36:51Z",
"updated_at": "2024-11-03T06:33:12Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -1442,7 +1442,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 1
},
@ -2277,10 +2277,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-10-31T15:25:58Z",
"updated_at": "2024-11-03T07:26:15Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -2289,7 +2289,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 2
},
@ -2687,10 +2687,10 @@
"description": "Proof of concept python script for regreSSHion exploit. ",
"fork": false,
"created_at": "2024-07-30T06:13:11Z",
"updated_at": "2024-10-29T04:56:58Z",
"updated_at": "2024-11-03T07:43:31Z",
"pushed_at": "2024-10-19T04:58:22Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
@ -2699,7 +2699,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -35,6 +35,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2754,7 +2754,7 @@
- [aydinnyunus/CVE-2024-24576-Exploit](https://github.com/aydinnyunus/CVE-2024-24576-Exploit)
- [foxoman/CVE-2024-24576-PoC---Nim](https://github.com/foxoman/CVE-2024-24576-PoC---Nim)
- [corysabol/batbadbut-demo](https://github.com/corysabol/batbadbut-demo)
- [mishalhossin/CVE-2024-24576-PoC-Python](https://github.com/mishalhossin/CVE-2024-24576-PoC-Python)
- [mishl-dev/CVE-2024-24576-PoC-Python](https://github.com/mishl-dev/CVE-2024-24576-PoC-Python)
- [lpn/CVE-2024-24576.jl](https://github.com/lpn/CVE-2024-24576.jl)
- [Gaurav1020/CVE-2024-24576-PoC-Rust](https://github.com/Gaurav1020/CVE-2024-24576-PoC-Rust)
- [SheL3G/CVE-2024-24576-PoC-BatBadBut](https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut)
@ -3523,7 +3523,6 @@
- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987)
- [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987)
- [HazeLook/CVE-2024-28987](https://github.com/HazeLook/CVE-2024-28987)
- [hatvix1/CVE-2024-28987](https://github.com/hatvix1/CVE-2024-28987)
### CVE-2024-28995 (2024-06-06)
@ -4706,6 +4705,7 @@
</code>
- [bartfroklage/CVE-2024-37383-POC](https://github.com/bartfroklage/CVE-2024-37383-POC)
- [amirzargham/CVE-2024-37383-exploit](https://github.com/amirzargham/CVE-2024-37383-exploit)
### CVE-2024-37393 (2024-06-10)
@ -5726,11 +5726,9 @@
### CVE-2024-47575
- [maybelookis/CVE-2024-47575](https://github.com/maybelookis/CVE-2024-47575)
- [HazeLook/CVE-2024-47575](https://github.com/HazeLook/CVE-2024-47575)
- [hatvix1/CVE-2024-47575](https://github.com/hatvix1/CVE-2024-47575)
- [hazesecurity/CVE-2024-47575](https://github.com/hazesecurity/CVE-2024-47575)
- [groshi/CVE-2024-47575-POC](https://github.com/groshi/CVE-2024-47575-POC)
- [zgimszhd61/CVE-2024-47575-POC](https://github.com/zgimszhd61/CVE-2024-47575-POC)
- [Fruktolzzz/CVE-2024-47575](https://github.com/Fruktolzzz/CVE-2024-47575)
- [krmxd/CVE-2024-47575](https://github.com/krmxd/CVE-2024-47575)
### CVE-2024-47854