Auto Update 2023/07/15 18:26:27

This commit is contained in:
motikan2010-bot 2023-07-16 03:26:27 +09:00
parent f82abf66f5
commit 4730ef72a1
23 changed files with 144 additions and 82 deletions

View file

@ -57,6 +57,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -57,6 +57,6 @@
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -73,10 +73,10 @@
"description": "CVE-2018-8581", "description": "CVE-2018-8581",
"fork": false, "fork": false,
"created_at": "2019-01-24T06:08:23Z", "created_at": "2019-01-24T06:08:23Z",
"updated_at": "2023-07-07T19:09:01Z", "updated_at": "2023-07-15T14:18:28Z",
"pushed_at": "2022-10-21T08:29:33Z", "pushed_at": "2022-10-21T08:29:33Z",
"stargazers_count": 360, "stargazers_count": 361,
"watchers_count": 360, "watchers_count": 361,
"has_discussions": false, "has_discussions": false,
"forks_count": 79, "forks_count": 79,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 79, "forks": 79,
"watchers": 360, "watchers": 361,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
} }

View file

@ -18,13 +18,13 @@
"stargazers_count": 1766, "stargazers_count": 1766,
"watchers_count": 1766, "watchers_count": 1766,
"has_discussions": false, "has_discussions": false,
"forks_count": 262, "forks_count": 261,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 262, "forks": 261,
"watchers": 1766, "watchers": 1766,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege", "description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false, "fork": false,
"created_at": "2020-02-11T16:42:34Z", "created_at": "2020-02-11T16:42:34Z",
"updated_at": "2023-07-15T03:12:57Z", "updated_at": "2023-07-15T16:29:02Z",
"pushed_at": "2021-12-23T16:28:28Z", "pushed_at": "2021-12-23T16:28:28Z",
"stargazers_count": 332, "stargazers_count": 333,
"watchers_count": 332, "watchers_count": 333,
"has_discussions": false, "has_discussions": false,
"forks_count": 57, "forks_count": 57,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 57, "forks": 57,
"watchers": 332, "watchers": 333,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
} }

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-1732 Exploit", "description": "CVE-2021-1732 Exploit",
"fork": false, "fork": false,
"created_at": "2021-03-05T02:11:10Z", "created_at": "2021-03-05T02:11:10Z",
"updated_at": "2023-07-09T00:28:17Z", "updated_at": "2023-07-15T16:29:29Z",
"pushed_at": "2021-03-05T03:10:26Z", "pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 397, "stargazers_count": 398,
"watchers_count": 397, "watchers_count": 398,
"has_discussions": false, "has_discussions": false,
"forks_count": 123, "forks_count": 123,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 123, "forks": 123,
"watchers": 397, "watchers": 398,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-15T04:15:34Z", "updated_at": "2023-07-15T15:09:58Z",
"pushed_at": "2023-05-14T12:08:39Z", "pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 972, "stargazers_count": 973,
"watchers_count": 972, "watchers_count": 973,
"has_discussions": false, "has_discussions": false,
"forks_count": 125, "forks_count": 125,
"allow_forking": true, "allow_forking": true,
@ -870,7 +870,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 125, "forks": 125,
"watchers": 972, "watchers": 973,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
} }

View file

@ -103,10 +103,10 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955", "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false, "fork": false,
"created_at": "2022-03-01T12:41:03Z", "created_at": "2022-03-01T12:41:03Z",
"updated_at": "2023-06-02T15:24:50Z", "updated_at": "2023-07-15T17:39:09Z",
"pushed_at": "2022-03-01T16:11:31Z", "pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 249, "stargazers_count": 250,
"watchers_count": 249, "watchers_count": 250,
"has_discussions": false, "has_discussions": false,
"forks_count": 47, "forks_count": 47,
"allow_forking": true, "allow_forking": true,
@ -115,7 +115,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 47, "forks": 47,
"watchers": 249, "watchers": 250,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-07-13T17:10:44Z", "updated_at": "2023-07-15T14:24:48Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1478, "stargazers_count": 1479,
"watchers_count": 1478, "watchers_count": 1479,
"has_discussions": false, "has_discussions": false,
"forks_count": 489, "forks_count": 489,
"allow_forking": true, "allow_forking": true,
@ -235,7 +235,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 489, "forks": 489,
"watchers": 1478, "watchers": 1479,
"score": 0, "score": 0,
"subscribers_count": 27 "subscribers_count": 27
}, },
@ -523,10 +523,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false, "fork": false,
"created_at": "2021-09-15T22:34:35Z", "created_at": "2021-09-15T22:34:35Z",
"updated_at": "2023-07-12T03:06:19Z", "updated_at": "2023-07-15T14:21:44Z",
"pushed_at": "2022-06-22T20:21:42Z", "pushed_at": "2022-06-22T20:21:42Z",
"stargazers_count": 748, "stargazers_count": 749,
"watchers_count": 748, "watchers_count": 749,
"has_discussions": false, "has_discussions": false,
"forks_count": 169, "forks_count": 169,
"allow_forking": true, "allow_forking": true,
@ -542,7 +542,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 169, "forks": 169,
"watchers": 748, "watchers": 749,
"score": 0, "score": 0,
"subscribers_count": 18 "subscribers_count": 18
}, },

View file

@ -212,5 +212,35 @@
"watchers": 80, "watchers": 80,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
},
{
"id": 666787170,
"name": "CVE-2021-40449",
"full_name": "toanthang1842002\/CVE-2021-40449",
"owner": {
"login": "toanthang1842002",
"id": 75765145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75765145?v=4",
"html_url": "https:\/\/github.com\/toanthang1842002"
},
"html_url": "https:\/\/github.com\/toanthang1842002\/CVE-2021-40449",
"description": null,
"fork": false,
"created_at": "2023-07-15T15:17:46Z",
"updated_at": "2023-07-15T15:22:03Z",
"pushed_at": "2023-07-15T15:22:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-07-12T09:27:30Z", "updated_at": "2023-07-15T15:28:21Z",
"pushed_at": "2023-02-08T23:41:04Z", "pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1616, "stargazers_count": 1615,
"watchers_count": 1616, "watchers_count": 1615,
"has_discussions": false, "has_discussions": false,
"forks_count": 475, "forks_count": 475,
"allow_forking": true, "allow_forking": true,
@ -924,7 +924,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 475, "forks": 475,
"watchers": 1616, "watchers": 1615,
"score": 0, "score": 0,
"subscribers_count": 25 "subscribers_count": 25
}, },
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-07-14T10:05:47Z", "updated_at": "2023-07-15T17:28:15Z",
"pushed_at": "2023-06-13T09:17:54Z", "pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 703, "stargazers_count": 704,
"watchers_count": 703, "watchers_count": 704,
"has_discussions": false, "has_discussions": false,
"forks_count": 114, "forks_count": 114,
"allow_forking": true, "allow_forking": true,
@ -1285,7 +1285,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 114, "forks": 114,
"watchers": 703, "watchers": 704,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },

View file

@ -1130,13 +1130,13 @@
"stargazers_count": 7, "stargazers_count": 7,
"watchers_count": 7, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 7, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false, "fork": false,
"created_at": "2022-08-09T15:53:48Z", "created_at": "2022-08-09T15:53:48Z",
"updated_at": "2023-07-14T05:40:07Z", "updated_at": "2023-07-15T17:47:13Z",
"pushed_at": "2023-05-10T00:02:31Z", "pushed_at": "2023-05-10T00:02:31Z",
"stargazers_count": 230, "stargazers_count": 233,
"watchers_count": 230, "watchers_count": 233,
"has_discussions": false, "has_discussions": false,
"forks_count": 47, "forks_count": 47,
"allow_forking": true, "allow_forking": true,
@ -33,7 +33,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 47, "forks": 47,
"watchers": 230, "watchers": 233,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-07-15T04:15:34Z", "updated_at": "2023-07-15T15:09:58Z",
"pushed_at": "2023-05-14T12:08:39Z", "pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 972, "stargazers_count": 973,
"watchers_count": 972, "watchers_count": 973,
"has_discussions": false, "has_discussions": false,
"forks_count": 125, "forks_count": 125,
"allow_forking": true, "allow_forking": true,
@ -785,7 +785,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 125, "forks": 125,
"watchers": 972, "watchers": 973,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
}, },

View file

@ -313,10 +313,10 @@
"description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.", "description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.",
"fork": false, "fork": false,
"created_at": "2022-03-31T15:01:12Z", "created_at": "2022-03-31T15:01:12Z",
"updated_at": "2023-05-26T15:48:05Z", "updated_at": "2023-07-15T15:07:38Z",
"pushed_at": "2022-04-06T15:00:14Z", "pushed_at": "2022-04-06T15:00:14Z",
"stargazers_count": 42, "stargazers_count": 43,
"watchers_count": 42, "watchers_count": 43,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -325,7 +325,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 42, "watchers": 43,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -173,19 +173,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-03-16T19:43:39Z", "created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-07-12T10:59:08Z", "updated_at": "2023-07-15T16:11:11Z",
"pushed_at": "2023-03-17T07:47:40Z", "pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 331, "stargazers_count": 332,
"watchers_count": 331, "watchers_count": 332,
"has_discussions": false, "has_discussions": false,
"forks_count": 61, "forks_count": 62,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 61, "forks": 62,
"watchers": 331, "watchers": 332,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -43,10 +43,10 @@
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践", "description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
"fork": false, "fork": false,
"created_at": "2023-05-11T07:37:52Z", "created_at": "2023-05-11T07:37:52Z",
"updated_at": "2023-07-14T05:51:18Z", "updated_at": "2023-07-15T14:07:20Z",
"pushed_at": "2023-06-15T01:25:03Z", "pushed_at": "2023-06-15T01:25:03Z",
"stargazers_count": 190, "stargazers_count": 191,
"watchers_count": 190, "watchers_count": 191,
"has_discussions": false, "has_discussions": false,
"forks_count": 28, "forks_count": 28,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 28, "forks": 28,
"watchers": 190, "watchers": 191,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability", "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false, "fork": false,
"created_at": "2023-06-28T13:22:26Z", "created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-07-15T09:28:51Z", "updated_at": "2023-07-15T13:59:45Z",
"pushed_at": "2023-07-08T09:27:10Z", "pushed_at": "2023-07-08T09:27:10Z",
"stargazers_count": 284, "stargazers_count": 285,
"watchers_count": 284, "watchers_count": 285,
"has_discussions": false, "has_discussions": false,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 284, "watchers": 285,
"score": 0, "score": 0,
"subscribers_count": 17 "subscribers_count": 17
} }

View file

@ -133,10 +133,10 @@
"description": "CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit", "description": "CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit",
"fork": false, "fork": false,
"created_at": "2023-06-01T14:48:26Z", "created_at": "2023-06-01T14:48:26Z",
"updated_at": "2023-07-15T06:46:08Z", "updated_at": "2023-07-15T15:52:40Z",
"pushed_at": "2023-06-07T13:07:30Z", "pushed_at": "2023-06-07T13:07:30Z",
"stargazers_count": 71, "stargazers_count": 72,
"watchers_count": 71, "watchers_count": 72,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -149,7 +149,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 71, "watchers": 72,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 23, "stargazers_count": 23,
"watchers_count": 23, "watchers_count": 23,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 23, "watchers": 23,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "The remediation script should set the reg entries described in https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty.", "description": "The remediation script should set the reg entries described in https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty.",
"fork": false, "fork": false,
"created_at": "2023-07-12T14:13:20Z", "created_at": "2023-07-12T14:13:20Z",
"updated_at": "2023-07-15T12:16:30Z", "updated_at": "2023-07-15T16:47:14Z",
"pushed_at": "2023-07-12T14:17:55Z", "pushed_at": "2023-07-12T14:17:55Z",
"stargazers_count": 2, "stargazers_count": 6,
"watchers_count": 2, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 2, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -58,5 +58,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 666813276,
"name": "CVE-2023-36884",
"full_name": "zerosorai\/CVE-2023-36884",
"owner": {
"login": "zerosorai",
"id": 30239081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30239081?v=4",
"html_url": "https:\/\/github.com\/zerosorai"
},
"html_url": "https:\/\/github.com\/zerosorai\/CVE-2023-36884",
"description": "This is an emergency solution while Microsoft addresses the vulnerability.",
"fork": false,
"created_at": "2023-07-15T16:56:18Z",
"updated_at": "2023-07-15T17:41:54Z",
"pushed_at": "2023-07-15T17:44:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Apache RocketMQ Arbitrary File Write Vulnerability Exploit", "description": "Apache RocketMQ Arbitrary File Write Vulnerability Exploit",
"fork": false, "fork": false,
"created_at": "2023-07-14T12:22:45Z", "created_at": "2023-07-14T12:22:45Z",
"updated_at": "2023-07-15T12:30:50Z", "updated_at": "2023-07-15T17:55:04Z",
"pushed_at": "2023-07-14T13:12:37Z", "pushed_at": "2023-07-14T13:12:37Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -2200,6 +2200,7 @@
- [Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline](https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline) - [Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline](https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline)
- [deepinstinct/Storm0978-RomCom-Campaign](https://github.com/deepinstinct/Storm0978-RomCom-Campaign) - [deepinstinct/Storm0978-RomCom-Campaign](https://github.com/deepinstinct/Storm0978-RomCom-Campaign)
- [zerosorai/CVE-2023-36884](https://github.com/zerosorai/CVE-2023-36884)
### CVE-2023-37189 (2023-07-10) ### CVE-2023-37189 (2023-07-10)
@ -12557,6 +12558,7 @@
- [CppXL/cve-2021-40449-poc](https://github.com/CppXL/cve-2021-40449-poc) - [CppXL/cve-2021-40449-poc](https://github.com/CppXL/cve-2021-40449-poc)
- [BL0odz/CVE-2021-40449-NtGdiResetDC-UAF](https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF) - [BL0odz/CVE-2021-40449-NtGdiResetDC-UAF](https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF)
- [SamuelTulach/voidmap](https://github.com/SamuelTulach/voidmap) - [SamuelTulach/voidmap](https://github.com/SamuelTulach/voidmap)
- [toanthang1842002/CVE-2021-40449](https://github.com/toanthang1842002/CVE-2021-40449)
### CVE-2021-40492 (2021-09-03) ### CVE-2021-40492 (2021-09-03)