Auto Update 2024/03/04 00:26:33

This commit is contained in:
motikan2010-bot 2024-03-04 09:26:33 +09:00
parent 7f5ff28fde
commit 398c4bec06
26 changed files with 102 additions and 102 deletions

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-02-28T07:29:09Z",
"updated_at": "2024-03-03T21:51:15Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 802,
"watchers_count": 802,
"stargazers_count": 803,
"watchers_count": 803,
"has_discussions": false,
"forks_count": 438,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 438,
"watchers": 802,
"watchers": 803,
"score": 0,
"subscribers_count": 11
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)",
"fork": false,
"created_at": "2021-07-29T01:17:22Z",
"updated_at": "2023-12-19T03:17:22Z",
"updated_at": "2024-03-03T23:50:04Z",
"pushed_at": "2022-12-22T01:40:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 2
}

View file

@ -27,6 +27,6 @@
"forks": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
}
]

View file

@ -73,10 +73,10 @@
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2023-09-28T11:03:29Z",
"updated_at": "2024-03-03T20:38:54Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 4
},

View file

@ -177,7 +177,7 @@
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
},
{
"id": 336189382,

View file

@ -13,10 +13,10 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false,
"created_at": "2019-08-15T11:54:21Z",
"updated_at": "2024-02-22T02:20:41Z",
"updated_at": "2024-03-03T19:58:21Z",
"pushed_at": "2022-04-04T15:16:08Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 176,
"watchers": 175,
"score": 0,
"subscribers_count": 13
}

View file

@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-03-01T09:10:49Z",
"updated_at": "2024-03-03T23:14:54Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 576,
"watchers_count": 576,
"stargazers_count": 577,
"watchers_count": 577,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 147,
"watchers": 576,
"watchers": 577,
"score": 0,
"subscribers_count": 13
},

View file

@ -73,10 +73,10 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2024-02-24T06:36:58Z",
"updated_at": "2024-03-03T18:39:33Z",
"pushed_at": "2022-09-01T06:33:36Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 8
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 16,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -37,7 +37,7 @@
"urls"
],
"visibility": "public",
"forks": 16,
"forks": 15,
"watchers": 77,
"score": 0,
"subscribers_count": 7

View file

@ -378,10 +378,10 @@
"description": "This PowerShell script will take the mitigation measures for CVE-2021-36934 described by Microsoft and the US CERT team. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934 https:\/\/kb.cert.org\/vuls\/id\/506989 USE AT YOUR OWN RISK -- BACKUPS MAY BREAK.",
"fork": false,
"created_at": "2021-07-25T18:00:35Z",
"updated_at": "2021-07-25T18:10:18Z",
"updated_at": "2024-03-03T20:00:17Z",
"pushed_at": "2021-07-25T18:10:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -390,7 +390,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-03-01T14:12:42Z",
"updated_at": "2024-03-03T18:36:47Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 691,
"watchers_count": 691,
"stargazers_count": 692,
"watchers_count": 692,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 691,
"watchers": 692,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-02-29T11:00:46Z",
"updated_at": "2024-03-03T20:39:45Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 253,
"watchers_count": 253,
"stargazers_count": 254,
"watchers_count": 254,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 253,
"watchers": 254,
"score": 0,
"subscribers_count": 9
}

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2024-01-30T19:34:13Z",
"updated_at": "2024-03-03T23:58:45Z",
"pushed_at": "2023-03-04T05:52:28Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 459,
"watchers": 460,
"score": 0,
"subscribers_count": 50
},

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2024-02-26T17:31:10Z",
"updated_at": "2024-03-03T21:41:02Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 377,
"watchers_count": 377,
"stargazers_count": 378,
"watchers_count": 378,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 377,
"watchers": 378,
"score": 0,
"subscribers_count": 11
},
@ -103,10 +103,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-03-02T04:15:22Z",
"updated_at": "2024-03-03T18:57:58Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 868,
"watchers_count": 868,
"stargazers_count": 867,
"watchers_count": 867,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 868,
"watchers": 867,
"score": 0,
"subscribers_count": 25
},

View file

@ -111,10 +111,10 @@
"description": "Windows_AFD_LPE_CVE-2023-21768",
"fork": false,
"created_at": "2023-03-13T20:32:50Z",
"updated_at": "2024-01-16T20:43:33Z",
"updated_at": "2024-03-03T23:36:10Z",
"pushed_at": "2023-08-27T10:41:40Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},

View file

@ -173,10 +173,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2024-02-22T06:54:09Z",
"updated_at": "2024-03-03T20:20:19Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -185,7 +185,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 340,
"watchers": 341,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2024-03-01T22:35:48Z",
"updated_at": "2024-03-03T20:15:13Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 207,
"watchers": 208,
"score": 0,
"subscribers_count": 4
},

View file

@ -234,10 +234,10 @@
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
"fork": false,
"created_at": "2023-08-28T14:48:22Z",
"updated_at": "2023-12-04T18:14:11Z",
"updated_at": "2024-03-03T20:15:51Z",
"pushed_at": "2023-08-28T15:33:27Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -246,7 +246,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 5
},

View file

@ -141,10 +141,10 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
"updated_at": "2024-02-11T09:23:26Z",
"updated_at": "2024-03-03T21:57:20Z",
"pushed_at": "2023-10-30T20:22:37Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -153,7 +153,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-02-25T08:08:34Z",
"updated_at": "2024-03-04T00:14:10Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2023-12-13T20:26:59Z",
"updated_at": "2024-03-03T09:09:56Z",
"updated_at": "2024-03-03T20:41:43Z",
"pushed_at": "2024-02-06T23:22:31Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Ultimate Member Unauthorized Database Access \/ SQLi",
"fork": false,
"created_at": "2024-02-27T11:41:53Z",
"updated_at": "2024-03-02T19:38:49Z",
"updated_at": "2024-03-04T00:02:10Z",
"pushed_at": "2024-02-27T11:45:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-20291-POC exploit ---> RCE",
"fork": false,
"created_at": "2024-03-03T00:04:40Z",
"updated_at": "2024-03-03T16:13:01Z",
"updated_at": "2024-03-03T20:34:26Z",
"pushed_at": "2024-03-03T09:06:38Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!!",
"fork": false,
"created_at": "2024-02-28T18:35:52Z",
"updated_at": "2024-03-01T14:26:59Z",
"updated_at": "2024-03-03T19:21:51Z",
"pushed_at": "2024-02-28T18:58:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-03-03T15:35:30Z",
"updated_at": "2024-03-04T00:23:52Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -500,10 +500,10 @@
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
"fork": false,
"created_at": "2024-02-04T20:56:42Z",
"updated_at": "2024-02-16T08:20:05Z",
"updated_at": "2024-03-03T20:44:03Z",
"pushed_at": "2024-02-05T14:10:26Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": true,
"forks_count": 2,
"allow_forking": true,
@ -512,7 +512,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 94,
"score": 0,
"subscribers_count": 1