Auto Update 2025/01/24 12:32:51

This commit is contained in:
motikan2010-bot 2025-01-24 21:32:51 +09:00
parent fbb4873316
commit 45a8208fad
40 changed files with 187 additions and 142 deletions

View file

@ -205,13 +205,13 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 18,
"score": 0,
"subscribers_count": 2

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-22T10:42:29Z",
"updated_at": "2025-01-24T10:06:17Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 2
},

33
2018/CVE-2018-14881.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 886907044,
"name": "CVE-2018-14881_no_patch",
"full_name": "uthrasri\/CVE-2018-14881_no_patch",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uthrasri\/CVE-2018-14881_no_patch",
"description": null,
"fork": false,
"created_at": "2024-11-11T20:27:52Z",
"updated_at": "2025-01-24T07:10:43Z",
"pushed_at": "2025-01-24T07:10:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -46,7 +46,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2025-01-10T20:53:21Z",
"pushed_at": "2025-01-10T20:53:19Z",
"pushed_at": "2025-01-24T09:14:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-24T06:12:58Z",
"pushed_at": "2025-01-24T06:12:56Z",
"updated_at": "2025-01-24T11:55:55Z",
"pushed_at": "2025-01-24T11:55:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-22T10:42:29Z",
"updated_at": "2025-01-24T10:06:17Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,8 +14,8 @@
"description": "Research and verification of vulnerabilities in pngcheck, including CVE-2020-27818, CVE-2020-35511 and other vulns found in version 2.4.0, 3.0.0, 3.0.1.",
"fork": false,
"created_at": "2025-01-19T18:33:13Z",
"updated_at": "2025-01-23T23:04:01Z",
"pushed_at": "2025-01-23T23:03:24Z",
"updated_at": "2025-01-24T09:58:00Z",
"pushed_at": "2025-01-24T09:57:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-24T02:32:54Z",
"updated_at": "2025-01-24T09:06:24Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1371,
"watchers_count": 1371,
"stargazers_count": 1372,
"watchers_count": 1372,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1371,
"watchers": 1372,
"score": 0,
"subscribers_count": 15
}

View file

@ -2106,10 +2106,10 @@
"description": "Pre-compiled builds for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-27T17:43:24Z",
"updated_at": "2025-01-18T19:19:46Z",
"updated_at": "2025-01-24T06:40:48Z",
"pushed_at": "2022-03-30T15:38:20Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -2118,7 +2118,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},

View file

@ -884,10 +884,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2025-01-24T00:16:35Z",
"updated_at": "2025-01-24T09:23:18Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 936,
"watchers_count": 936,
"stargazers_count": 937,
"watchers_count": 937,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -916,7 +916,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 936,
"watchers": 937,
"score": 0,
"subscribers_count": 25
},
@ -6379,13 +6379,13 @@
"stargazers_count": 344,
"watchers_count": 344,
"has_discussions": false,
"forks_count": 87,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 87,
"forks": 88,
"watchers": 344,
"score": 0,
"subscribers_count": 35

View file

@ -946,10 +946,10 @@
"description": "CVE-2022-0847 POC and Docker and Analysis write up",
"fork": false,
"created_at": "2022-03-10T01:27:29Z",
"updated_at": "2024-08-12T20:21:25Z",
"updated_at": "2025-01-24T07:49:27Z",
"pushed_at": "2022-03-10T01:31:57Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -958,7 +958,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 3
},
@ -1871,10 +1871,10 @@
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
"fork": false,
"created_at": "2022-06-04T08:31:32Z",
"updated_at": "2024-12-25T08:00:52Z",
"updated_at": "2025-01-24T07:41:23Z",
"pushed_at": "2022-06-16T17:14:10Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1891,7 +1891,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-24T02:32:54Z",
"updated_at": "2025-01-24T09:06:24Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1371,
"watchers_count": 1371,
"stargazers_count": 1372,
"watchers_count": 1372,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1371,
"watchers": 1372,
"score": 0,
"subscribers_count": 15
}

View file

@ -743,19 +743,19 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-24T00:18:10Z",
"updated_at": "2025-01-24T08:56:51Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 73,
"forks": 18,
"watchers": 74,
"score": 0,
"subscribers_count": 7
},
@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-24T06:10:22Z",
"pushed_at": "2025-01-24T06:10:18Z",
"updated_at": "2025-01-24T12:12:09Z",
"pushed_at": "2025-01-24T12:12:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-11-13T16:20:32Z",
"updated_at": "2025-01-24T09:05:12Z",
"pushed_at": "2024-09-04T02:10:57Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 96,
"watchers": 97,
"score": 0,
"subscribers_count": 4
},

View file

@ -1361,7 +1361,7 @@
"fork": false,
"created_at": "2023-09-22T17:17:26Z",
"updated_at": "2023-09-22T17:17:44Z",
"pushed_at": "2024-12-20T00:06:26Z",
"pushed_at": "2025-01-24T11:47:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T16:08:56Z",
"updated_at": "2024-12-26T15:15:39Z",
"updated_at": "2025-01-24T11:23:12Z",
"pushed_at": "2023-02-26T06:43:18Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 231,
"watchers_count": 231,
"has_discussions": false,
"forks_count": 44,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 230,
"forks": 45,
"watchers": 231,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-23T13:50:49Z",
"updated_at": "2025-01-24T12:04:06Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1395,
"watchers_count": 1395,
"stargazers_count": 1396,
"watchers_count": 1396,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 1395,
"watchers": 1396,
"score": 0,
"subscribers_count": 21
},
@ -231,8 +231,8 @@
"description": "Rust implementation of Marc Newlin's keystroke injection proof of concept (CVE-2023-45866).",
"fork": false,
"created_at": "2024-12-20T17:28:48Z",
"updated_at": "2025-01-20T13:58:06Z",
"pushed_at": "2025-01-20T13:58:05Z",
"updated_at": "2025-01-24T12:08:12Z",
"pushed_at": "2025-01-24T12:08:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -34,7 +34,7 @@
"forks": 303,
"watchers": 2330,
"score": 0,
"subscribers_count": 27
"subscribers_count": 28
},
{
"id": 781477717,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
"updated_at": "2025-01-18T14:52:01Z",
"updated_at": "2025-01-24T06:31:22Z",
"pushed_at": "2024-09-05T23:21:00Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 116,
"watchers": 117,
"score": 0,
"subscribers_count": 3
}

View file

@ -293,10 +293,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2025-01-19T11:59:57Z",
"updated_at": "2025-01-24T11:35:06Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 1
},

View file

@ -442,6 +442,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,7 +28,7 @@
"forks": 10,
"watchers": 56,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 919035435,

View file

@ -111,10 +111,10 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
"updated_at": "2024-11-28T05:26:21Z",
"updated_at": "2025-01-24T11:54:26Z",
"pushed_at": "2024-10-02T21:58:12Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 167,
"watchers": 168,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious shortcuts.",
"fork": false,
"created_at": "2025-01-20T15:30:55Z",
"updated_at": "2025-01-21T12:40:16Z",
"updated_at": "2025-01-24T08:02:17Z",
"pushed_at": "2025-01-21T12:40:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-24T02:17:57Z",
"updated_at": "2025-01-24T12:23:54Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 59,
"forks": 8,
"watchers": 63,
"score": 0,
"subscribers_count": 0
},

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2025-01-19T19:09:56Z",
"updated_at": "2025-01-24T07:32:53Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 245,
"watchers": 246,
"score": 0,
"subscribers_count": 4
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-23T18:32:08Z",
"updated_at": "2025-01-24T11:04:17Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 458,
"watchers_count": 458,
"stargazers_count": 459,
"watchers_count": 459,
"has_discussions": false,
"forks_count": 106,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 106,
"watchers": 458,
"watchers": 459,
"score": 0,
"subscribers_count": 4
},

View file

@ -33,7 +33,7 @@
"forks": 43,
"watchers": 213,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 919776614,

View file

@ -107,10 +107,10 @@
"description": "Apache TomcatCVE-2024-50379条件竞争致远程代码执行漏洞批量检测脚本",
"fork": false,
"created_at": "2024-12-20T05:24:10Z",
"updated_at": "2025-01-13T14:22:11Z",
"updated_at": "2025-01-24T08:35:11Z",
"pushed_at": "2024-12-20T05:41:23Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2025-01-20T13:20:22Z",
"updated_at": "2025-01-24T11:58:35Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 71,
"watchers": 73,
"score": 0,
"subscribers_count": 3
},

View file

@ -57,7 +57,7 @@
"description": "AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other details.",
"fork": false,
"created_at": "2024-12-02T05:15:11Z",
"updated_at": "2025-01-15T09:34:57Z",
"updated_at": "2025-01-24T10:29:44Z",
"pushed_at": "2025-01-15T09:34:55Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -66,7 +66,12 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"anydesk",
"cve-2024-52940",
"hack",
"sniffer"
],
"visibility": "public",
"forks": 0,
"watchers": 1,

View file

@ -28,6 +28,6 @@
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-24T04:02:00Z",
"updated_at": "2025-01-24T11:58:27Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 1
},
@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-21T12:30:21Z",
"updated_at": "2025-01-24T04:01:54Z",
"updated_at": "2025-01-24T10:48:37Z",
"pushed_at": "2025-01-23T07:40:16Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,9 +57,9 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 14,
"watchers": 16,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 920641121,

View file

@ -28,7 +28,7 @@
"forks": 12,
"watchers": 85,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 875609314,

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-24T06:12:58Z",
"pushed_at": "2025-01-24T06:12:56Z",
"updated_at": "2025-01-24T12:14:50Z",
"pushed_at": "2025-01-24T12:14:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-23T13:45:25Z",
"updated_at": "2025-01-24T06:32:21Z",
"pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,12 +14,12 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-01-22T14:40:34Z",
"updated_at": "2025-01-24T06:13:08Z",
"updated_at": "2025-01-24T11:39:40Z",
"pushed_at": "2025-01-22T15:08:56Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,8 +32,8 @@
"poc"
],
"visibility": "public",
"forks": 9,
"watchers": 46,
"forks": 10,
"watchers": 52,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,19 +14,19 @@
"description": "Proof of concept & details for CVE-2025-21298",
"fork": false,
"created_at": "2025-01-20T18:16:51Z",
"updated_at": "2025-01-24T04:32:34Z",
"updated_at": "2025-01-24T12:32:39Z",
"pushed_at": "2025-01-20T18:22:01Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 28,
"forks": 12,
"watchers": 38,
"score": 0,
"subscribers_count": 0
}

View file

@ -42680,6 +42680,13 @@
- [Trinadh465/external_tcpdump_CVE-2018-14880](https://github.com/Trinadh465/external_tcpdump_CVE-2018-14880)
### CVE-2018-14881 (2019-10-03)
<code>The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
</code>
- [uthrasri/CVE-2018-14881_no_patch](https://github.com/uthrasri/CVE-2018-14881_no_patch)
### CVE-2018-15131 (2019-05-30)
<code>An issue was discovered in Synacor Zimbra Collaboration Suite 8.6.x before 8.6.0 Patch 11, 8.7.x before 8.7.11 Patch 6, 8.8.x before 8.8.8 Patch 9, and 8.8.9 before 8.8.9 Patch 3. Account number enumeration is possible via inconsistent responses for specific types of authentication requests.