Auto Update 2024/04/20 00:31:14

This commit is contained in:
motikan2010-bot 2024-04-20 09:31:14 +09:00
parent 55b1f50b93
commit 214972f984
20 changed files with 86 additions and 86 deletions

View file

@ -223,10 +223,10 @@
"description": "A PoC exploit for CVE-2017-5487 - WordPress User Enumeration.",
"fork": false,
"created_at": "2023-05-06T22:46:08Z",
"updated_at": "2024-01-23T09:12:45Z",
"updated_at": "2024-04-19T18:40:28Z",
"pushed_at": "2023-09-27T22:34:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -240,7 +240,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -92,7 +92,7 @@
"forks": 0,
"watchers": 8,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 786978803,

View file

@ -32,7 +32,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 714260511,

View file

@ -4902,6 +4902,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -3636,10 +3636,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-04-19T15:43:48Z",
"updated_at": "2024-04-19T21:39:52Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3349,
"watchers_count": 3349,
"stargazers_count": 3350,
"watchers_count": 3350,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3648,7 +3648,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3349,
"watchers": 3350,
"score": 0,
"subscribers_count": 57
},

View file

@ -1224,10 +1224,10 @@
"description": "Tool for CVE-2022-1388 ",
"fork": false,
"created_at": "2022-05-13T10:18:29Z",
"updated_at": "2023-09-28T11:38:47Z",
"updated_at": "2024-04-19T22:26:49Z",
"pushed_at": "2022-05-13T10:22:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -1242,7 +1242,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,8 +13,8 @@
"description": "nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481",
"fork": false,
"created_at": "2023-02-26T23:39:42Z",
"updated_at": "2024-01-21T14:08:59Z",
"pushed_at": "2023-02-27T01:57:43Z",
"updated_at": "2024-04-19T19:57:42Z",
"pushed_at": "2024-04-19T19:57:39Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -133,10 +133,10 @@
"description": "GoAnywhere MFT CVE-2023-0669 LicenseResponseServlet Deserialization Vulnerabilities Python RCE PoC(Proof of Concept)",
"fork": false,
"created_at": "2023-04-06T03:40:03Z",
"updated_at": "2024-01-26T08:27:31Z",
"updated_at": "2024-04-19T22:37:59Z",
"pushed_at": "2023-07-07T10:42:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,7 +48,7 @@
"stargazers_count": 769,
"watchers_count": 769,
"has_discussions": false,
"forks_count": 140,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"exploit"
],
"visibility": "public",
"forks": 140,
"forks": 138,
"watchers": 769,
"score": 0,
"subscribers_count": 9
@ -676,10 +676,10 @@
"description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.",
"fork": false,
"created_at": "2023-09-03T21:14:05Z",
"updated_at": "2024-04-09T12:36:15Z",
"updated_at": "2024-04-19T20:12:53Z",
"pushed_at": "2023-09-08T06:15:42Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -688,7 +688,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-18T15:04:02Z",
"updated_at": "2024-04-19T19:30:14Z",
"pushed_at": "2024-04-08T13:43:21Z",
"stargazers_count": 412,
"watchers_count": 412,
"stargazers_count": 413,
"watchers_count": 413,
"has_discussions": false,
"forks_count": 65,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 412,
"forks": 66,
"watchers": 413,
"score": 0,
"subscribers_count": 7
},

View file

@ -124,10 +124,10 @@
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
"fork": false,
"created_at": "2024-01-02T14:20:10Z",
"updated_at": "2024-04-11T17:58:36Z",
"updated_at": "2024-04-19T21:31:41Z",
"pushed_at": "2024-03-24T18:20:52Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 1
},

View file

@ -106,10 +106,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-04-11T05:37:41Z",
"updated_at": "2024-04-19T20:33:53Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -118,7 +118,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 231,
"watchers": 232,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-19T16:19:43Z",
"updated_at": "2024-04-20T00:13:38Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1864,
"watchers_count": 1864,
"stargazers_count": 1868,
"watchers_count": 1868,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 232,
"watchers": 1864,
"watchers": 1868,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-04-19T15:56:09Z",
"updated_at": "2024-04-19T19:56:30Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,19 +13,19 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-19T16:34:05Z",
"updated_at": "2024-04-19T19:05:53Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"has_discussions": false,
"forks_count": 40,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 179,
"forks": 42,
"watchers": 180,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,19 +43,19 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-04-17T03:48:17Z",
"updated_at": "2024-04-19T20:12:33Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 556,
"watchers_count": 556,
"stargazers_count": 557,
"watchers_count": 557,
"has_discussions": false,
"forks_count": 125,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 556,
"forks": 124,
"watchers": 557,
"score": 0,
"subscribers_count": 8
},

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-19T15:54:25Z",
"updated_at": "2024-04-19T19:46:18Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3392,
"watchers_count": 3392,
"stargazers_count": 3394,
"watchers_count": 3394,
"has_discussions": false,
"forks_count": 228,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 228,
"watchers": 3392,
"watchers": 3394,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "Exploit for CVE-2024-3273, supports single and multiple hosts",
"fork": false,
"created_at": "2024-04-07T15:36:18Z",
"updated_at": "2024-04-09T01:46:48Z",
"updated_at": "2024-04-19T20:05:55Z",
"pushed_at": "2024-04-07T15:41:42Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 34,
"score": 0,
"subscribers_count": 2
@ -283,10 +283,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-19T17:05:57Z",
"updated_at": "2024-04-19T19:58:16Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 83,
"watchers": 82,
"score": 0,
"subscribers_count": 1
},
@ -318,13 +318,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 2
@ -831,19 +831,19 @@
"description": "Extract useful information from PANOS support file for CVE-2024-3400",
"fork": false,
"created_at": "2024-04-19T14:56:17Z",
"updated_at": "2024-04-19T15:02:56Z",
"pushed_at": "2024-04-19T15:02:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-04-20T00:32:23Z",
"pushed_at": "2024-04-19T20:06:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}