Auto Update 2022/12/11 06:19:12

This commit is contained in:
motikan2010-bot 2022-12-11 15:19:12 +09:00
parent 86263739cf
commit 1d4a1fce81
14 changed files with 56 additions and 56 deletions

View file

@ -13,10 +13,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2022-11-21T10:47:03Z",
"updated_at": "2022-12-11T04:53:16Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2281,
"watchers_count": 2281,
"stargazers_count": 2282,
"watchers_count": 2282,
"has_discussions": false,
"forks_count": 486,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 486,
"watchers": 2281,
"watchers": 2282,
"score": 0
},
{

View file

@ -1120,10 +1120,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2022-12-03T05:30:25Z",
"updated_at": "2022-12-11T03:01:54Z",
"pushed_at": "2017-10-30T22:46:11Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -1139,7 +1139,7 @@
],
"visibility": "public",
"forks": 54,
"watchers": 146,
"watchers": 147,
"score": 0
},
{

View file

@ -79,13 +79,13 @@
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 51,
"score": 0
},

View file

@ -137,10 +137,10 @@
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码动手制作自己的payload",
"fork": false,
"created_at": "2019-12-10T02:39:57Z",
"updated_at": "2022-08-08T02:46:06Z",
"updated_at": "2022-12-11T03:50:03Z",
"pushed_at": "2021-04-02T09:12:32Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -149,7 +149,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 28,
"watchers": 29,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-05-11T13:09:52Z",
"updated_at": "2021-05-09T12:11:55Z",
"pushed_at": "2022-12-06T02:29:10Z",
"pushed_at": "2022-12-11T05:53:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -129,10 +129,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2022-11-14T12:24:16Z",
"updated_at": "2022-12-11T01:58:23Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 322,
"watchers": 323,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2022-12-03T01:04:22Z",
"updated_at": "2022-12-11T03:11:01Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": true,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 19,
"watchers": 99,
"forks": 20,
"watchers": 100,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "Laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2022-11-15T17:39:29Z",
"updated_at": "2022-12-11T03:51:44Z",
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 115,
"watchers": 116,
"score": 0
},
{

View file

@ -414,7 +414,7 @@
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -429,7 +429,7 @@
"thehackersbrain"
],
"visibility": "public",
"forks": 23,
"forks": 24,
"watchers": 58,
"score": 0
},

View file

@ -651,10 +651,10 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2022-11-15T05:26:35Z",
"updated_at": "2022-12-11T03:30:21Z",
"pushed_at": "2022-10-24T02:25:53Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -663,7 +663,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 491,
"watchers": 492,
"score": 0
},
{
@ -1049,10 +1049,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-12-10T22:54:41Z",
"updated_at": "2022-12-11T05:19:20Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3140,
"watchers_count": 3140,
"stargazers_count": 3141,
"watchers_count": 3141,
"has_discussions": true,
"forks_count": 735,
"allow_forking": true,
@ -1061,7 +1061,7 @@
"topics": [],
"visibility": "public",
"forks": 735,
"watchers": 3140,
"watchers": 3141,
"score": 0
},
{

View file

@ -1180,13 +1180,13 @@
"stargazers_count": 362,
"watchers_count": 362,
"has_discussions": false,
"forks_count": 101,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 101,
"forks": 102,
"watchers": 362,
"score": 0
},

View file

@ -1697,10 +1697,10 @@
"description": null,
"fork": false,
"created_at": "2022-11-30T04:06:56Z",
"updated_at": "2022-12-01T08:35:16Z",
"updated_at": "2022-12-11T05:37:02Z",
"pushed_at": "2022-11-30T04:07:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1709,7 +1709,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-12-09T23:14:23Z",
"updated_at": "2022-12-11T01:24:53Z",
"pushed_at": "2022-10-27T16:35:08Z",
"stargazers_count": 386,
"watchers_count": 386,
"stargazers_count": 387,
"watchers_count": 387,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 386,
"watchers": 387,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
"fork": false,
"created_at": "2022-12-09T22:48:38Z",
"updated_at": "2022-12-10T20:12:16Z",
"pushed_at": "2022-12-10T16:34:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"updated_at": "2022-12-11T05:57:44Z",
"pushed_at": "2022-12-11T01:31:11Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"rce"
],
"visibility": "public",
"forks": 3,
"watchers": 12,
"forks": 4,
"watchers": 23,
"score": 0
}
]