Auto Update 2022/01/01 06:14:36

This commit is contained in:
motikan2010-bot 2022-01-01 15:14:36 +09:00
parent 74ae368efb
commit 29b89b49de
19 changed files with 82 additions and 82 deletions

View file

@ -1071,10 +1071,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2021-12-24T21:01:05Z",
"updated_at": "2022-01-01T05:49:29Z",
"pushed_at": "2017-10-30T22:46:11Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
@ -1088,7 +1088,7 @@
],
"visibility": "public",
"forks": 50,
"watchers": 122,
"watchers": 123,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
"fork": false,
"created_at": "2016-05-02T12:18:57Z",
"updated_at": "2021-12-24T10:18:55Z",
"updated_at": "2022-01-01T01:54:59Z",
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 105,
"watchers": 106,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2021-12-29T20:17:07Z",
"updated_at": "2022-01-01T00:53:12Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 438,
"watchers_count": 438,
"stargazers_count": 439,
"watchers_count": 439,
"forks_count": 192,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 192,
"watchers": 438,
"watchers": 439,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2018-13379",
"fork": false,
"created_at": "2019-08-11T09:44:37Z",
"updated_at": "2021-12-22T07:08:31Z",
"updated_at": "2022-01-01T03:18:03Z",
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 243,
"watchers_count": 243,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 242,
"watchers": 243,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2018-13382",
"fork": false,
"created_at": "2019-08-11T11:13:44Z",
"updated_at": "2021-12-22T07:05:39Z",
"updated_at": "2022-01-01T03:17:58Z",
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 142,
"watchers": 143,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2021-12-15T14:37:02Z",
"updated_at": "2022-01-01T03:18:04Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 143,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 354,
"watchers": 355,
"score": 0
},
{

View file

@ -125,12 +125,12 @@
"pushed_at": "2020-02-20T02:41:44Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 18,
"score": 0
},

View file

@ -17,14 +17,14 @@
"pushed_at": "2019-02-18T13:10:38Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2019-6453"
],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 50,
"score": 0
},

View file

@ -155,17 +155,17 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-12-27T05:53:01Z",
"updated_at": "2022-01-01T01:55:52Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 390,
"watchers_count": 390,
"stargazers_count": 391,
"watchers_count": 391,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 390,
"watchers": 391,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-10T14:38:05Z",
"updated_at": "2021-10-28T04:43:15Z",
"updated_at": "2022-01-01T05:20:01Z",
"pushed_at": "2021-02-10T14:39:04Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 29,
"watchers": 30,
"score": 0
}
]

View file

@ -155,17 +155,17 @@
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
"updated_at": "2021-12-28T13:51:53Z",
"updated_at": "2022-01-01T03:18:37Z",
"pushed_at": "2021-12-16T08:25:02Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 28,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 88,
"forks": 29,
"watchers": 89,
"score": 0
},
{

View file

@ -283,17 +283,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2021-12-31T07:00:16Z",
"updated_at": "2022-01-01T03:37:33Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 89,
"watchers": 90,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-12-31T01:46:23Z",
"updated_at": "2022-01-01T05:42:08Z",
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 52,
"watchers": 123,
"watchers": 124,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false,
"created_at": "2021-06-28T09:43:31Z",
"updated_at": "2021-12-09T11:41:54Z",
"updated_at": "2022-01-01T05:23:30Z",
"pushed_at": "2021-08-03T14:48:27Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.",
"fork": false,
"created_at": "2021-11-28T13:12:38Z",
"updated_at": "2021-12-31T02:45:40Z",
"updated_at": "2022-01-01T01:17:38Z",
"pushed_at": "2021-12-05T16:54:16Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2021-12-31T09:04:43Z",
"updated_at": "2022-01-01T00:50:34Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 176,
"watchers_count": 176,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 175,
"watchers": 176,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
"fork": false,
"created_at": "2021-11-26T01:51:57Z",
"updated_at": "2021-12-14T03:52:53Z",
"updated_at": "2022-01-01T00:16:34Z",
"pushed_at": "2021-11-28T01:12:40Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -394,12 +394,12 @@
"pushed_at": "2021-12-27T10:27:42Z",
"stargazers_count": 856,
"watchers_count": 856,
"forks_count": 339,
"forks_count": 338,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 339,
"forks": 338,
"watchers": 856,
"score": 0
},
@ -905,10 +905,10 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2021-12-31T21:35:37Z",
"updated_at": "2022-01-01T05:02:39Z",
"pushed_at": "2021-12-27T22:09:33Z",
"stargazers_count": 1075,
"watchers_count": 1075,
"stargazers_count": 1077,
"watchers_count": 1077,
"forks_count": 265,
"allow_forking": true,
"is_template": false,
@ -920,7 +920,7 @@
],
"visibility": "public",
"forks": 265,
"watchers": 1075,
"watchers": 1077,
"score": 0
},
{
@ -3565,8 +3565,8 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T04:14:18Z",
"updated_at": "2021-12-30T05:56:00Z",
"pushed_at": "2021-12-29T00:02:34Z",
"updated_at": "2022-01-01T01:52:05Z",
"pushed_at": "2022-01-01T01:52:02Z",
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 82,
@ -4393,8 +4393,8 @@
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-13T16:39:16Z",
"updated_at": "2022-01-01T00:00:33Z",
"pushed_at": "2022-01-01T00:00:30Z",
"updated_at": "2022-01-01T06:00:26Z",
"pushed_at": "2022-01-01T06:00:23Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 10,
@ -5238,10 +5238,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2021-12-31T03:09:20Z",
"updated_at": "2022-01-01T04:40:36Z",
"pushed_at": "2021-12-27T15:12:20Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
@ -5254,7 +5254,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 235,
"watchers": 238,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-12-28T07:57:13Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 50,
"score": 0
}