Auto Update 2024/10/22 12:31:43

This commit is contained in:
motikan2010-bot 2024-10-22 21:31:43 +09:00
parent 9a4d5dcd93
commit 2a6004807f
53 changed files with 209 additions and 240 deletions

View file

@ -122,36 +122,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 874159698,
"name": "unreal_ircd_3281_backdoor_and_mitigation",
"full_name": "nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation",
"owner": {
"login": "nwclasantha",
"id": 48653609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48653609?v=4",
"html_url": "https:\/\/github.com\/nwclasantha",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation",
"description": "The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised.",
"fork": false,
"created_at": "2024-10-17T10:59:25Z",
"updated_at": "2024-10-18T06:52:11Z",
"pushed_at": "2024-10-17T11:18:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -50,7 +50,7 @@
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"forks_count": 338,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -77,7 +77,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 337,
"forks": 338,
"watchers": 1997,
"score": 0,
"subscribers_count": 37

View file

@ -19,7 +19,7 @@
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"forks_count": 338,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -46,7 +46,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 337,
"forks": 338,
"watchers": 1997,
"score": 0,
"subscribers_count": 37

View file

@ -50,7 +50,7 @@
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"forks_count": 338,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -77,7 +77,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 337,
"forks": 338,
"watchers": 1997,
"score": 0,
"subscribers_count": 37

View file

@ -14,10 +14,10 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2024-08-23T05:59:39Z",
"updated_at": "2024-10-22T07:49:31Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 206,
"watchers_count": 206,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 205,
"watchers": 206,
"score": 0,
"subscribers_count": 14
},

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2024-10-16T16:54:39Z",
"updated_at": "2024-10-22T09:54:11Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 505,
"watchers_count": 505,
"stargazers_count": 506,
"watchers_count": 506,
"has_discussions": false,
"forks_count": 453,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 453,
"watchers": 505,
"watchers": 506,
"score": 0,
"subscribers_count": 58
},

View file

@ -581,7 +581,7 @@
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"forks_count": 338,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -608,7 +608,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 337,
"forks": 338,
"watchers": 1997,
"score": 0,
"subscribers_count": 37

View file

@ -14,10 +14,10 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2024-09-20T12:45:17Z",
"updated_at": "2024-10-22T07:48:36Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 59,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 5
}

View file

@ -45,10 +45,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2024-09-29T20:10:17Z",
"updated_at": "2024-10-22T09:30:58Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 3
},

View file

@ -205,7 +205,7 @@
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"forks_count": 338,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -232,7 +232,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 337,
"forks": 338,
"watchers": 1997,
"score": 0,
"subscribers_count": 37

View file

@ -19,7 +19,7 @@
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"forks_count": 338,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -46,7 +46,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 337,
"forks": 338,
"watchers": 1997,
"score": 0,
"subscribers_count": 37

View file

@ -14,10 +14,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2024-10-01T19:41:35Z",
"updated_at": "2024-10-22T10:04:13Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 148,
"watchers": 149,
"score": 0,
"subscribers_count": 17
}

View file

@ -138,10 +138,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2024-10-22T03:17:36Z",
"updated_at": "2024-10-22T07:08:36Z",
"pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 264,
"watchers_count": 264,
"stargazers_count": 263,
"watchers_count": 263,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 264,
"watchers": 263,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2024-10-01T19:41:35Z",
"updated_at": "2024-10-22T10:04:13Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 148,
"watchers": 149,
"score": 0,
"subscribers_count": 17
}

View file

@ -14,10 +14,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-10-14T06:39:51Z",
"updated_at": "2024-10-22T09:32:29Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 8
},

View file

@ -209,10 +209,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2024-08-26T17:43:50Z",
"updated_at": "2024-10-22T06:20:59Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -221,7 +221,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 115,
"watchers": 116,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2024-10-22T02:21:47Z",
"updated_at": "2024-10-22T06:49:56Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 250,
"watchers_count": 250,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 249,
"watchers": 250,
"score": 0,
"subscribers_count": 6
},

View file

@ -3778,36 +3778,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 873479806,
"name": "Apache_2.4.29_Exploit",
"full_name": "nwclasantha\/Apache_2.4.29_Exploit",
"owner": {
"login": "nwclasantha",
"id": 48653609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48653609?v=4",
"html_url": "https:\/\/github.com\/nwclasantha",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nwclasantha\/Apache_2.4.29_Exploit",
"description": "This document provides step-by-step instructions on performing a proof of concept (PoC) exploit on Apache HTTP Server 2.4.29, taking advantage of the path traversal vulnerability (CVE-2021-41773) and the globally accessible \/tmp folder on Linux and MITIGATION",
"fork": false,
"created_at": "2024-10-16T08:38:50Z",
"updated_at": "2024-10-18T06:52:06Z",
"pushed_at": "2024-10-16T11:41:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -319,6 +319,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 445382835,
"name": "CVE-2021-42013",
"full_name": "rnsss\/CVE-2021-42013",
"owner": {
"login": "rnsss",
"id": 48343279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
"html_url": "https:\/\/github.com\/rnsss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rnsss\/CVE-2021-42013",
"description": "CVE-2021-42013-exp",
"fork": false,
"created_at": "2022-01-07T03:12:45Z",
"updated_at": "2022-01-07T03:12:50Z",
"pushed_at": "2022-01-07T03:12:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 455174932,
"name": "CVE-2021-42013-LAB",

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-10-14T02:35:21Z",
"updated_at": "2024-10-22T07:59:39Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 786,
"watchers_count": 786,
"stargazers_count": 787,
"watchers_count": 787,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 786,
"watchers": 787,
"score": 0,
"subscribers_count": 13
},

View file

@ -3625,10 +3625,10 @@
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
"fork": false,
"created_at": "2021-12-13T01:55:51Z",
"updated_at": "2024-08-13T04:06:32Z",
"updated_at": "2024-10-22T09:05:33Z",
"pushed_at": "2021-12-13T09:18:19Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -3637,7 +3637,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 2
},

View file

@ -200,10 +200,10 @@
"description": "Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 5.8.3.",
"fork": false,
"created_at": "2023-01-13T13:31:34Z",
"updated_at": "2024-02-03T11:17:03Z",
"updated_at": "2024-10-22T07:08:42Z",
"pushed_at": "2023-11-30T14:51:15Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -217,7 +217,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-10-22T06:15:22Z",
"updated_at": "2024-10-22T08:22:27Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 160,
"watchers": 766,
"watchers": 767,
"score": 0,
"subscribers_count": 15
}

View file

@ -132,10 +132,10 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2024-10-17T09:52:09Z",
"updated_at": "2024-10-22T07:08:32Z",
"pushed_at": "2022-08-04T18:26:18Z",
"stargazers_count": 313,
"watchers_count": 313,
"stargazers_count": 312,
"watchers_count": 312,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -144,7 +144,7 @@
"topics": [],
"visibility": "public",
"forks": 233,
"watchers": 313,
"watchers": 312,
"score": 0,
"subscribers_count": 10
},

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-10-21T13:44:23Z",
"updated_at": "2024-10-22T08:17:01Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 271,
"watchers_count": 271,
"has_discussions": true,
"forks_count": 39,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 270,
"watchers": 271,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
"updated_at": "2024-10-13T09:15:19Z",
"updated_at": "2024-10-22T09:08:29Z",
"pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 296,
"watchers_count": 296,
"stargazers_count": 297,
"watchers_count": 297,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 296,
"watchers": 297,
"score": 0,
"subscribers_count": 6
}

View file

@ -14,10 +14,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false,
"created_at": "2023-08-09T19:56:07Z",
"updated_at": "2024-10-14T01:29:18Z",
"updated_at": "2024-10-22T07:08:34Z",
"pushed_at": "2023-08-10T05:12:20Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 37,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2023-12-13T20:26:59Z",
"updated_at": "2024-10-21T10:39:04Z",
"updated_at": "2024-10-22T07:08:39Z",
"pushed_at": "2024-02-06T23:22:31Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 72,
"watchers": 71,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-20T15:29:14Z",
"updated_at": "2024-10-20T15:31:06Z",
"updated_at": "2024-10-22T10:02:17Z",
"pushed_at": "2024-10-20T15:31:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-10-17T06:20:22Z",
"updated_at": "2024-10-22T09:49:56Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2267,
"watchers_count": 2267,
@ -220,6 +220,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,7 +19,7 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"windows"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 1

View file

@ -448,10 +448,10 @@
"description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC",
"fork": false,
"created_at": "2024-08-31T13:18:43Z",
"updated_at": "2024-10-22T06:14:30Z",
"updated_at": "2024-10-22T08:25:58Z",
"pushed_at": "2024-10-13T09:43:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -460,7 +460,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -59,7 +59,7 @@
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 873807169,
@ -152,6 +152,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-13T08:44:25Z",
"updated_at": "2024-08-13T08:52:26Z",
"updated_at": "2024-10-22T08:57:01Z",
"pushed_at": "2024-08-13T08:52:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 6,
"watchers": 30,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-10-21T12:02:55Z",
"updated_at": "2024-10-22T11:12:22Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 402,
"watchers_count": 402,
"stargazers_count": 404,
"watchers_count": 404,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 402,
"watchers": 404,
"score": 0,
"subscribers_count": 8
},

View file

@ -28,6 +28,6 @@
"forks": 18,
"watchers": 71,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -572,10 +572,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-18T10:16:22Z",
"updated_at": "2024-09-15T20:05:03Z",
"updated_at": "2024-10-22T07:09:25Z",
"pushed_at": "2024-04-22T05:06:51Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -584,7 +584,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-10-22T03:49:50Z",
"updated_at": "2024-10-22T10:22:53Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 179,
"watchers_count": 179,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -26,9 +26,9 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 177,
"watchers": 179,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 872851083,
@ -45,10 +45,10 @@
"description": "Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) ",
"fork": false,
"created_at": "2024-10-15T07:23:47Z",
"updated_at": "2024-10-21T15:21:36Z",
"updated_at": "2024-10-22T12:06:18Z",
"pushed_at": "2024-10-21T04:15:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -61,8 +61,8 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -270,13 +270,13 @@
"stargazers_count": 613,
"watchers_count": 613,
"has_discussions": false,
"forks_count": 112,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 112,
"forks": 113,
"watchers": 613,
"score": 0,
"subscribers_count": 4

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-40711-exp",
"fork": false,
"created_at": "2024-10-16T05:02:27Z",
"updated_at": "2024-10-18T16:53:42Z",
"updated_at": "2024-10-22T11:22:13Z",
"pushed_at": "2024-10-17T01:06:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-10-14T08:45:13Z",
"updated_at": "2024-10-22T11:38:51Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Ruby-SAML \/ GitLab Authentication Bypass (CVE-2024-45409) exploit",
"fork": false,
"created_at": "2024-10-07T09:24:46Z",
"updated_at": "2024-10-19T02:59:54Z",
"updated_at": "2024-10-22T06:56:33Z",
"pushed_at": "2024-10-07T11:50:17Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -36,6 +36,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -269,10 +269,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-10-17T14:11:26Z",
"updated_at": "2024-10-22T12:30:21Z",
"pushed_at": "2024-09-24T19:18:56Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 449,
"watchers_count": 449,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -287,7 +287,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 450,
"watchers": 449,
"score": 0,
"subscribers_count": 5
},
@ -2273,10 +2273,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-10-20T15:22:33Z",
"updated_at": "2024-10-22T08:43:59Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -2285,7 +2285,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},
@ -2404,10 +2404,10 @@
"description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.",
"fork": false,
"created_at": "2024-07-09T17:40:19Z",
"updated_at": "2024-10-19T14:48:00Z",
"updated_at": "2024-10-22T08:45:32Z",
"pushed_at": "2024-07-10T15:24:08Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -2416,7 +2416,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 92,
"watchers": 93,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-10-22T05:55:39Z",
"updated_at": "2024-10-22T08:09:40Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-10-18T14:47:07Z",
"updated_at": "2024-10-22T09:03:53Z",
"pushed_at": "2024-10-04T09:39:09Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 109,
"watchers": 111,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-10-22T05:10:20Z",
"updated_at": "2024-10-22T11:41:32Z",
"pushed_at": "2024-10-19T16:01:12Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 54,
"watchers": 56,
"score": 0,
"subscribers_count": 1
},
@ -124,7 +124,7 @@
"description": "Grafana RCE exploit (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-21T03:36:05Z",
"updated_at": "2024-10-21T23:55:24Z",
"updated_at": "2024-10-22T07:31:50Z",
"pushed_at": "2024-10-21T22:31:47Z",
"stargazers_count": 4,
"watchers_count": 4,
@ -134,6 +134,7 @@
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-9264",
"duckdb",
"exploit",
"grafana",
@ -144,7 +145,7 @@
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 876056610,
@ -175,6 +176,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9464",
"fork": false,
"created_at": "2024-10-09T16:36:25Z",
"updated_at": "2024-10-20T06:35:50Z",
"updated_at": "2024-10-22T07:03:17Z",
"pushed_at": "2024-10-09T16:41:41Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 4
}

View file

@ -25565,7 +25565,6 @@
- [Zyx2440/Apache-HTTP-Server-2.4.50-RCE](https://github.com/Zyx2440/Apache-HTTP-Server-2.4.50-RCE)
- [0xc4t/CVE-2021-41773](https://github.com/0xc4t/CVE-2021-41773)
- [jkska23/Additive-Vulnerability-Analysis-CVE-2021-41773](https://github.com/jkska23/Additive-Vulnerability-Analysis-CVE-2021-41773)
- [nwclasantha/Apache_2.4.29_Exploit](https://github.com/nwclasantha/Apache_2.4.29_Exploit)
### CVE-2021-41784 (2022-08-29)
@ -25621,6 +25620,7 @@
- [robotsense1337/CVE-2021-42013](https://github.com/robotsense1337/CVE-2021-42013)
- [xMohamed0/CVE-2021-42013-ApacheRCE](https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE)
- [asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp](https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp)
- [rnsss/CVE-2021-42013](https://github.com/rnsss/CVE-2021-42013)
- [jas9reet/CVE-2021-42013-LAB](https://github.com/jas9reet/CVE-2021-42013-LAB)
- [mauricelambert/CVE-2021-42013](https://github.com/mauricelambert/CVE-2021-42013)
- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013)
@ -46480,7 +46480,6 @@
- [chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution)
- [FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1](https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1)
- [JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution)
- [nwclasantha/unreal_ircd_3281_backdoor_and_mitigation](https://github.com/nwclasantha/unreal_ircd_3281_backdoor_and_mitigation)
### CVE-2010-2387 (2012-12-21)