Auto Update 2024/12/27 06:31:34

This commit is contained in:
motikan2010-bot 2024-12-27 15:31:34 +09:00
parent 6a00f857cf
commit 24fde0549c
40 changed files with 148 additions and 148 deletions

View file

@ -14,10 +14,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-04-28T00:59:13Z",
"updated_at": "2024-12-27T05:58:44Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -49,10 +49,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-04-28T00:59:13Z",
"updated_at": "2024-12-27T05:58:44Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -1666,10 +1666,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-04-28T00:59:13Z",
"updated_at": "2024-12-27T05:58:44Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1678,7 +1678,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -142,10 +142,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-04-28T00:59:13Z",
"updated_at": "2024-12-27T05:58:44Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-04-28T00:59:13Z",
"updated_at": "2024-12-27T05:58:44Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2024-11-22T21:44:15Z",
"updated_at": "2024-12-27T03:05:22Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 757,
"watchers_count": 757,
"stargazers_count": 758,
"watchers_count": 758,
"has_discussions": false,
"forks_count": 168,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 168,
"watchers": 757,
"watchers": 758,
"score": 0,
"subscribers_count": 41
},

View file

@ -14,10 +14,10 @@
"description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE",
"fork": false,
"created_at": "2020-07-26T01:28:53Z",
"updated_at": "2024-10-18T17:08:42Z",
"updated_at": "2024-12-27T03:32:41Z",
"pushed_at": "2021-08-01T12:25:59Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 0
},

View file

@ -988,8 +988,8 @@
},
{
"id": 908439500,
"name": "CVE-2020-14882-HoaxShell",
"full_name": "AleksaZatezalo\/CVE-2020-14882-HoaxShell",
"name": "CVE-2020-14882",
"full_name": "AleksaZatezalo\/CVE-2020-14882",
"owner": {
"login": "AleksaZatezalo",
"id": 59803757,
@ -997,12 +997,12 @@
"html_url": "https:\/\/github.com\/AleksaZatezalo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AleksaZatezalo\/CVE-2020-14882-HoaxShell",
"html_url": "https:\/\/github.com\/AleksaZatezalo\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2024-12-26T04:45:46Z",
"updated_at": "2024-12-26T04:47:06Z",
"pushed_at": "2024-12-26T04:47:03Z",
"updated_at": "2024-12-27T03:03:05Z",
"pushed_at": "2024-12-27T03:02:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "GitLab-Graphql-CVE-2020-26413 POC",
"fork": false,
"created_at": "2022-06-30T06:29:28Z",
"updated_at": "2022-06-30T06:31:09Z",
"updated_at": "2024-12-27T03:05:44Z",
"pushed_at": "2022-06-30T06:31:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -112,10 +112,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2024-12-14T21:15:39Z",
"updated_at": "2024-12-27T05:19:59Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 530,
"watchers_count": 530,
"stargazers_count": 531,
"watchers_count": 531,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 530,
"watchers": 531,
"score": 0,
"subscribers_count": 8
},

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-26T18:57:38Z",
"updated_at": "2024-12-27T05:19:04Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1359,
"watchers_count": 1359,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1354,
"watchers": 1359,
"score": 0,
"subscribers_count": 15
}

View file

@ -45,10 +45,10 @@
"description": "A PoC exploit for CVE-2021-4191 - GitLab User Enumeration.",
"fork": false,
"created_at": "2023-07-22T21:06:51Z",
"updated_at": "2024-07-12T03:11:26Z",
"updated_at": "2024-12-27T03:05:58Z",
"pushed_at": "2023-08-09T10:41:22Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -12333,10 +12333,10 @@
"description": "Instructions for exploiting vulnerabilities CVE-2021-44228 and CVE-2023-46604",
"fork": false,
"created_at": "2023-12-07T08:02:53Z",
"updated_at": "2024-03-21T06:45:44Z",
"updated_at": "2024-12-27T05:56:06Z",
"pushed_at": "2024-03-20T06:20:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -12345,7 +12345,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -1163,10 +1163,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-12-22T16:55:49Z",
"updated_at": "2024-12-27T04:25:28Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 562,
"watchers_count": 562,
"stargazers_count": 563,
"watchers_count": 563,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -1175,7 +1175,7 @@
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 562,
"watchers": 563,
"score": 0,
"subscribers_count": 15
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-26T18:57:38Z",
"updated_at": "2024-12-27T05:19:04Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1359,
"watchers_count": 1359,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1354,
"watchers": 1359,
"score": 0,
"subscribers_count": 15
}

View file

@ -107,10 +107,10 @@
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"fork": false,
"created_at": "2024-11-07T13:06:44Z",
"updated_at": "2024-12-21T08:39:32Z",
"updated_at": "2024-12-27T05:03:55Z",
"pushed_at": "2024-11-07T13:38:18Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 75,
"watchers": 77,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-15T14:16:32Z",
"updated_at": "2024-12-27T02:16:47Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1172,
"watchers_count": 1172,
"stargazers_count": 1173,
"watchers_count": 1173,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1172,
"watchers": 1173,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,10 +14,10 @@
"description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.",
"fork": false,
"created_at": "2022-12-22T17:52:26Z",
"updated_at": "2024-11-04T00:37:35Z",
"updated_at": "2024-12-27T03:00:50Z",
"pushed_at": "2022-12-26T09:49:16Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Authenticated Remote Command Execution in Gitlab via GitHub import",
"fork": false,
"created_at": "2022-10-08T11:42:49Z",
"updated_at": "2024-12-06T23:49:38Z",
"updated_at": "2024-12-27T02:58:40Z",
"pushed_at": "2022-10-09T03:54:53Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 223,
"watchers": 224,
"score": 0,
"subscribers_count": 4
},

View file

@ -28,6 +28,6 @@
"forks": 40,
"watchers": 131,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
}
]

View file

@ -90,6 +90,6 @@
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -193,7 +193,7 @@
"forks": 64,
"watchers": 341,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 615147191,

View file

@ -76,10 +76,10 @@
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
"fork": false,
"created_at": "2023-04-22T21:34:06Z",
"updated_at": "2024-12-22T13:56:52Z",
"updated_at": "2024-12-27T02:54:43Z",
"pushed_at": "2023-05-01T19:31:20Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 4
},

View file

@ -90,7 +90,7 @@
"forks": 47,
"watchers": 236,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 682770739,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-23T15:25:49Z",
"updated_at": "2024-12-09T04:06:58Z",
"updated_at": "2024-12-27T00:34:26Z",
"pushed_at": "2024-03-23T18:59:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 1312,
"watchers_count": 1312,
"has_discussions": false,
"forks_count": 221,
"forks_count": 222,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 221,
"forks": 222,
"watchers": 1312,
"score": 0,
"subscribers_count": 21

View file

@ -45,10 +45,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-12-26T15:38:06Z",
"updated_at": "2024-12-27T02:59:24Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 233,
"watchers_count": 233,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 231,
"watchers": 233,
"score": 0,
"subscribers_count": 4
},
@ -481,10 +481,10 @@
"description": "Instructions for exploiting vulnerabilities CVE-2021-44228 and CVE-2023-46604",
"fork": false,
"created_at": "2023-12-07T08:02:53Z",
"updated_at": "2024-03-21T06:45:44Z",
"updated_at": "2024-12-27T05:56:06Z",
"pushed_at": "2024-03-20T06:20:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -493,7 +493,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -200,10 +200,10 @@
"description": "Pluck-CMS v4.7.18 RCE exploit",
"fork": false,
"created_at": "2024-12-22T12:41:05Z",
"updated_at": "2024-12-22T12:59:17Z",
"updated_at": "2024-12-27T02:44:06Z",
"pushed_at": "2024-12-22T12:59:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Unauthenticated Local File Inclusion",
"fork": false,
"created_at": "2024-12-24T03:59:15Z",
"updated_at": "2024-12-26T18:08:56Z",
"updated_at": "2024-12-27T00:59:19Z",
"pushed_at": "2024-12-24T04:19:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-12356: Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)",
"fork": false,
"created_at": "2024-12-17T15:01:37Z",
"updated_at": "2024-12-18T19:58:39Z",
"updated_at": "2024-12-27T01:00:33Z",
"pushed_at": "2024-12-17T15:31:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-30085",
"fork": false,
"created_at": "2024-12-25T06:03:45Z",
"updated_at": "2024-12-27T00:07:00Z",
"pushed_at": "2024-12-25T06:09:37Z",
"updated_at": "2024-12-27T02:08:18Z",
"pushed_at": "2024-12-27T02:08:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -389,10 +389,10 @@
"description": "Remotely Exploiting The Kernel Via IPv6",
"fork": false,
"created_at": "2024-08-28T15:28:14Z",
"updated_at": "2024-08-30T01:27:19Z",
"updated_at": "2024-12-27T06:00:11Z",
"pushed_at": "2024-08-30T01:27:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -401,7 +401,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 210,
"watchers_count": 210,
"has_discussions": false,
"forks_count": 87,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 87,
"forks": 86,
"watchers": 210,
"score": 0,
"subscribers_count": 5

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-25T10:13:21Z",
"updated_at": "2024-12-27T01:15:41Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-12-14T15:26:19Z",
"updated_at": "2024-12-27T02:54:09Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-26T13:14:50Z",
"updated_at": "2024-12-27T04:45:47Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 102,
"watchers": 105,
"score": 0,
"subscribers_count": 1
},

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-26T18:54:26Z",
"updated_at": "2024-12-27T06:11:26Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 3
},

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-26T06:46:12Z",
"updated_at": "2024-12-27T06:18:13Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 3
},
@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-17T02:22:38Z",
"updated_at": "2024-12-19T11:52:08Z",
"updated_at": "2024-12-27T06:12:11Z",
"pushed_at": "2024-12-17T08:52:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-25T18:57:11Z",
"updated_at": "2024-12-27T02:31:28Z",
"pushed_at": "2024-12-23T12:51:54Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -33206,7 +33206,7 @@
- [LucasPDiniz/CVE-2020-14882](https://github.com/LucasPDiniz/CVE-2020-14882)
- [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882)
- [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC)
- [AleksaZatezalo/CVE-2020-14882-HoaxShell](https://github.com/AleksaZatezalo/CVE-2020-14882-HoaxShell)
- [AleksaZatezalo/CVE-2020-14882](https://github.com/AleksaZatezalo/CVE-2020-14882)
### CVE-2020-14883 (2020-10-21)