Auto Update 2024/12/31 18:31:35

This commit is contained in:
motikan2010-bot 2025-01-01 03:31:35 +09:00
parent fddd3c5e9e
commit 2cea8ef464
19 changed files with 64 additions and 64 deletions

View file

@ -59,6 +59,6 @@
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -1183,10 +1183,10 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2024-11-17T06:56:07Z",
"updated_at": "2024-12-31T15:47:51Z",
"pushed_at": "2023-02-02T02:17:30Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -1195,7 +1195,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 276,
"watchers": 277,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2024-11-13T00:06:38Z",
"updated_at": "2024-12-31T13:49:02Z",
"pushed_at": "2024-07-31T13:54:45Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 104,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 104,
"watchers": 323,
"watchers": 324,
"score": 0,
"subscribers_count": 22
},
@ -276,6 +276,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -188,7 +188,7 @@
"forks": 62,
"watchers": 99,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 111601525,

View file

@ -28,7 +28,7 @@
"forks": 36,
"watchers": 86,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 202627780,

View file

@ -59,7 +59,7 @@
"forks": 42,
"watchers": 95,
"score": 0,
"subscribers_count": 14
"subscribers_count": 15
},
{
"id": 103428172,

View file

@ -14,8 +14,8 @@
"description": "Precompiled lib3mf.dll for MeshMixer which includes a backported patch for CVE-2021-21772 and zlib 1.3.1",
"fork": false,
"created_at": "2024-12-31T03:48:46Z",
"updated_at": "2024-12-31T04:26:07Z",
"pushed_at": "2024-12-31T04:25:49Z",
"updated_at": "2024-12-31T12:55:46Z",
"pushed_at": "2024-12-31T12:55:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2024-11-17T06:56:07Z",
"updated_at": "2024-12-31T15:47:51Z",
"pushed_at": "2023-02-02T02:17:30Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 276,
"watchers": 277,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-12-29T14:24:48Z",
"updated_at": "2024-12-31T14:43:42Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 313,
"watchers_count": 313,
"stargazers_count": 314,
"watchers_count": 314,
"has_discussions": true,
"forks_count": 46,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 313,
"watchers": 314,
"score": 0,
"subscribers_count": 8
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 20,
"score": 0,
"subscribers_count": 1

View file

@ -14,12 +14,12 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-31T12:24:50Z",
"updated_at": "2024-12-31T15:48:24Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,8 +36,8 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 8,
"watchers": 58,
"forks": 9,
"watchers": 59,
"score": 0,
"subscribers_count": 1
}

View file

@ -368,7 +368,7 @@
"description": "WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit",
"fork": false,
"created_at": "2024-12-22T11:53:14Z",
"updated_at": "2024-12-23T14:22:15Z",
"updated_at": "2024-12-31T18:07:17Z",
"pushed_at": "2024-12-23T14:22:12Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-21182",
"fork": false,
"created_at": "2024-12-29T15:48:03Z",
"updated_at": "2024-12-31T08:58:18Z",
"updated_at": "2024-12-31T17:27:03Z",
"pushed_at": "2024-12-29T15:56:14Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"watchers": 26,
"score": 0,
"subscribers_count": 1
}

View file

@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-09T19:24:53Z",
"updated_at": "2024-10-11T20:09:19Z",
"updated_at": "2024-12-31T13:26:25Z",
"pushed_at": "2024-10-11T20:09:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,12 +45,12 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-31T12:24:50Z",
"updated_at": "2024-12-31T15:48:24Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -67,8 +67,8 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 8,
"watchers": 58,
"forks": 9,
"watchers": 59,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-4295 Email Subscribers by Icegram Express <= 5.7.20 - Unauthenticated SQL Injection via hash",
"fork": false,
"created_at": "2024-06-05T09:29:20Z",
"updated_at": "2024-06-26T12:02:48Z",
"updated_at": "2024-12-31T13:25:42Z",
"pushed_at": "2024-06-05T10:24:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-30T02:49:58Z",
"updated_at": "2024-12-31T15:50:29Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 2
},

View file

@ -200,19 +200,19 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-31T10:14:53Z",
"updated_at": "2024-12-31T14:34:05Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 55,
"forks": 15,
"watchers": 56,
"score": 0,
"subscribers_count": 3
},

View file

@ -82,10 +82,10 @@
"description": "Cleo 远程代码执行漏洞批量检测脚本CVE-2024-50623",
"fork": false,
"created_at": "2024-12-31T07:43:48Z",
"updated_at": "2024-12-31T07:46:53Z",
"updated_at": "2024-12-31T16:32:22Z",
"pushed_at": "2024-12-31T07:46:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}