Auto Update 2025/01/14 12:33:20

This commit is contained in:
motikan2010-bot 2025-01-14 21:33:20 +09:00
parent a5c9c3a350
commit 4fe083fbab
27 changed files with 106 additions and 138 deletions

View file

@ -231,10 +231,10 @@
"description": "Heartbleed (CVE-2014-0160) client exploit", "description": "Heartbleed (CVE-2014-0160) client exploit",
"fork": false, "fork": false,
"created_at": "2014-04-08T16:41:51Z", "created_at": "2014-04-08T16:41:51Z",
"updated_at": "2024-12-19T10:54:22Z", "updated_at": "2025-01-14T11:05:31Z",
"pushed_at": "2016-01-22T00:42:35Z", "pushed_at": "2016-01-22T00:42:35Z",
"stargazers_count": 320, "stargazers_count": 321,
"watchers_count": 320, "watchers_count": 321,
"has_discussions": false, "has_discussions": false,
"forks_count": 78, "forks_count": 78,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 78, "forks": 78,
"watchers": 320, "watchers": 321,
"score": 0, "score": 0,
"subscribers_count": 32 "subscribers_count": 32
}, },
@ -1108,10 +1108,10 @@
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:", "description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
"fork": false, "fork": false,
"created_at": "2015-03-08T19:54:33Z", "created_at": "2015-03-08T19:54:33Z",
"updated_at": "2024-12-23T18:21:57Z", "updated_at": "2025-01-14T11:03:40Z",
"pushed_at": "2021-02-20T19:41:03Z", "pushed_at": "2021-02-20T19:41:03Z",
"stargazers_count": 81, "stargazers_count": 82,
"watchers_count": 81, "watchers_count": 82,
"has_discussions": false, "has_discussions": false,
"forks_count": 42, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
@ -1120,7 +1120,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 42,
"watchers": 81, "watchers": 82,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -1197,10 +1197,10 @@
"description": "Shellshock exploit + vulnerable environment", "description": "Shellshock exploit + vulnerable environment",
"fork": false, "fork": false,
"created_at": "2016-12-07T23:38:50Z", "created_at": "2016-12-07T23:38:50Z",
"updated_at": "2024-12-12T05:34:07Z", "updated_at": "2025-01-14T11:01:08Z",
"pushed_at": "2023-05-11T02:12:25Z", "pushed_at": "2023-05-11T02:12:25Z",
"stargazers_count": 205, "stargazers_count": 206,
"watchers_count": 205, "watchers_count": 206,
"has_discussions": false, "has_discussions": false,
"forks_count": 56, "forks_count": 56,
"allow_forking": true, "allow_forking": true,
@ -1216,7 +1216,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 56, "forks": 56,
"watchers": 205, "watchers": 206,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -76,10 +76,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false, "fork": false,
"created_at": "2016-10-21T11:19:21Z", "created_at": "2016-10-21T11:19:21Z",
"updated_at": "2025-01-14T05:37:30Z", "updated_at": "2025-01-14T12:01:17Z",
"pushed_at": "2021-02-03T16:03:40Z", "pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 966, "stargazers_count": 967,
"watchers_count": 966, "watchers_count": 967,
"has_discussions": false, "has_discussions": false,
"forks_count": 395, "forks_count": 395,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 395, "forks": 395,
"watchers": 966, "watchers": 967,
"score": 0, "score": 0,
"subscribers_count": 64 "subscribers_count": 64
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -487,10 +487,10 @@
"description": "Mitigate CVE-2018-6389 WordPress load-scripts \/ load-styles attacks", "description": "Mitigate CVE-2018-6389 WordPress load-scripts \/ load-styles attacks",
"fork": false, "fork": false,
"created_at": "2018-08-30T01:25:20Z", "created_at": "2018-08-30T01:25:20Z",
"updated_at": "2024-04-23T16:23:17Z", "updated_at": "2025-01-14T11:25:49Z",
"pushed_at": "2018-08-30T01:47:48Z", "pushed_at": "2018-08-30T01:47:48Z",
"stargazers_count": 12, "stargazers_count": 13,
"watchers_count": 12, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -505,7 +505,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 12, "watchers": 13,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
}, },

View file

@ -2386,37 +2386,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 651560536,
"name": "CVE-2018-6574",
"full_name": "Zeeshan12340\/CVE-2018-6574",
"owner": {
"login": "Zeeshan12340",
"id": 110278382,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110278382?v=4",
"html_url": "https:\/\/github.com\/Zeeshan12340",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zeeshan12340\/CVE-2018-6574",
"description": null,
"fork": false,
"created_at": "2023-06-09T14:08:23Z",
"updated_at": "2023-06-09T14:12:07Z",
"pushed_at": "2023-06-09T14:36:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 698841275, "id": 698841275,
"name": "CVE-2018-6574-POC", "name": "CVE-2018-6574-POC",

View file

@ -176,8 +176,8 @@
"description": "I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for that", "description": "I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for that",
"fork": false, "fork": false,
"created_at": "2020-02-28T03:47:40Z", "created_at": "2020-02-28T03:47:40Z",
"updated_at": "2024-08-12T19:58:11Z", "updated_at": "2025-01-14T09:31:40Z",
"pushed_at": "2020-02-28T04:04:54Z", "pushed_at": "2025-01-14T09:31:36Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-13T20:12:48Z", "updated_at": "2025-01-14T08:05:36Z",
"pushed_at": "2024-04-25T06:09:38Z", "pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1364, "stargazers_count": 1366,
"watchers_count": 1364, "watchers_count": 1366,
"has_discussions": false, "has_discussions": false,
"forks_count": 167, "forks_count": 167,
"allow_forking": true, "allow_forking": true,
@ -867,7 +867,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 167, "forks": 167,
"watchers": 1364, "watchers": 1366,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-13T20:12:48Z", "updated_at": "2025-01-14T08:05:36Z",
"pushed_at": "2024-04-25T06:09:38Z", "pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1364, "stargazers_count": 1366,
"watchers_count": 1364, "watchers_count": 1366,
"has_discussions": false, "has_discussions": false,
"forks_count": 167, "forks_count": 167,
"allow_forking": true, "allow_forking": true,
@ -811,7 +811,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 167, "forks": 167,
"watchers": 1364, "watchers": 1366,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -14,10 +14,10 @@
"description": "LPE exploit for CVE-2023-21768", "description": "LPE exploit for CVE-2023-21768",
"fork": false, "fork": false,
"created_at": "2023-03-07T23:00:27Z", "created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-12-22T23:14:00Z", "updated_at": "2025-01-14T09:04:57Z",
"pushed_at": "2023-07-10T16:35:49Z", "pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 486, "stargazers_count": 487,
"watchers_count": 486, "watchers_count": 487,
"has_discussions": false, "has_discussions": false,
"forks_count": 163, "forks_count": 163,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 163, "forks": 163,
"watchers": 486, "watchers": 487,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },

View file

@ -164,10 +164,10 @@
"description": "This is an Exploit for Unrestricted file upload in big file upload functionality in Chamilo-LMS for this location \"\/main\/inc\/lib\/javascript\/bigupload\/inc\/bigUpload.php\" in Chamilo LMS <= v1.11.24, and Attackers can obtain remote code execution via uploading of web shell.", "description": "This is an Exploit for Unrestricted file upload in big file upload functionality in Chamilo-LMS for this location \"\/main\/inc\/lib\/javascript\/bigupload\/inc\/bigUpload.php\" in Chamilo LMS <= v1.11.24, and Attackers can obtain remote code execution via uploading of web shell.",
"fork": false, "fork": false,
"created_at": "2024-07-08T09:48:38Z", "created_at": "2024-07-08T09:48:38Z",
"updated_at": "2024-11-08T19:00:18Z", "updated_at": "2025-01-14T12:17:26Z",
"pushed_at": "2024-07-08T11:55:53Z", "pushed_at": "2024-07-08T11:55:53Z",
"stargazers_count": 7, "stargazers_count": 6,
"watchers_count": 7, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -187,7 +187,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 7, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false, "fork": false,
"created_at": "2024-06-18T12:30:53Z", "created_at": "2024-06-18T12:30:53Z",
"updated_at": "2025-01-11T20:59:30Z", "updated_at": "2025-01-14T07:14:22Z",
"pushed_at": "2024-12-02T06:29:52Z", "pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 276, "stargazers_count": 277,
"watchers_count": 276, "watchers_count": 277,
"has_discussions": false, "has_discussions": false,
"forks_count": 64, "forks_count": 64,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 64, "forks": 64,
"watchers": 276, "watchers": 277,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2025-01-14T03:51:06Z", "updated_at": "2025-01-14T11:52:11Z",
"pushed_at": "2024-04-17T16:09:54Z", "pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2325, "stargazers_count": 2324,
"watchers_count": 2325, "watchers_count": 2324,
"has_discussions": false, "has_discussions": false,
"forks_count": 302, "forks_count": 302,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 302, "forks": 302,
"watchers": 2325, "watchers": 2324,
"score": 0, "score": 0,
"subscribers_count": 27 "subscribers_count": 27
}, },

View file

@ -45,10 +45,10 @@
"description": "Proof Of Concept for CVE-2024-1874", "description": "Proof Of Concept for CVE-2024-1874",
"fork": false, "fork": false,
"created_at": "2024-07-18T15:25:17Z", "created_at": "2024-07-18T15:25:17Z",
"updated_at": "2024-09-19T18:30:06Z", "updated_at": "2025-01-14T09:05:58Z",
"pushed_at": "2024-09-19T18:30:03Z", "pushed_at": "2024-09-19T18:30:03Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code", "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false, "fork": false,
"created_at": "2024-06-10T17:02:03Z", "created_at": "2024-06-10T17:02:03Z",
"updated_at": "2025-01-03T07:18:37Z", "updated_at": "2025-01-14T07:58:13Z",
"pushed_at": "2024-07-04T10:39:15Z", "pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 330, "stargazers_count": 331,
"watchers_count": 330, "watchers_count": 331,
"has_discussions": false, "has_discussions": false,
"forks_count": 63, "forks_count": 63,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 63, "forks": 63,
"watchers": 330, "watchers": 331,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },
@ -45,10 +45,10 @@
"description": "Windows LPE", "description": "Windows LPE",
"fork": false, "fork": false,
"created_at": "2024-06-11T08:03:29Z", "created_at": "2024-06-11T08:03:29Z",
"updated_at": "2025-01-06T11:32:04Z", "updated_at": "2025-01-14T07:13:17Z",
"pushed_at": "2024-06-11T20:41:59Z", "pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 114, "stargazers_count": 115,
"watchers_count": 114, "watchers_count": 115,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 114, "watchers": 115,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -81,13 +81,13 @@
"stargazers_count": 17, "stargazers_count": 17,
"watchers_count": 17, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 33,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 33,
"watchers": 17, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0

View file

@ -100,6 +100,6 @@
"forks": 2, "forks": 2,
"watchers": 7, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 1
} }
] ]

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false, "fork": false,
"created_at": "2024-04-01T14:28:09Z", "created_at": "2024-04-01T14:28:09Z",
"updated_at": "2025-01-11T16:47:54Z", "updated_at": "2025-01-14T07:52:18Z",
"pushed_at": "2024-04-03T04:58:50Z", "pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3506, "stargazers_count": 3507,
"watchers_count": 3506, "watchers_count": 3507,
"has_discussions": false, "has_discussions": false,
"forks_count": 239, "forks_count": 239,
"allow_forking": true, "allow_forking": true,
@ -964,7 +964,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 239, "forks": 239,
"watchers": 3506, "watchers": 3507,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 261, "stargazers_count": 261,
"watchers_count": 261, "watchers_count": 261,
"has_discussions": false, "has_discussions": false,
"forks_count": 57, "forks_count": 58,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 57, "forks": 58,
"watchers": 261, "watchers": 261,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
@ -125,6 +125,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -176,10 +176,10 @@
"description": "geoserver CVE-2024-36401漏洞利用工具", "description": "geoserver CVE-2024-36401漏洞利用工具",
"fork": false, "fork": false,
"created_at": "2024-07-17T02:25:21Z", "created_at": "2024-07-17T02:25:21Z",
"updated_at": "2024-12-13T01:40:18Z", "updated_at": "2025-01-14T08:01:08Z",
"pushed_at": "2024-07-24T15:33:03Z", "pushed_at": "2024-07-24T15:33:03Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -188,7 +188,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 16, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false, "fork": false,
"created_at": "2024-11-19T08:57:18Z", "created_at": "2024-11-19T08:57:18Z",
"updated_at": "2025-01-14T03:24:56Z", "updated_at": "2025-01-14T08:09:16Z",
"pushed_at": "2024-11-19T09:15:26Z", "pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 118, "stargazers_count": 119,
"watchers_count": 118, "watchers_count": 119,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 118, "watchers": 119,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false, "fork": false,
"created_at": "2025-01-01T15:48:38Z", "created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-14T06:20:03Z", "updated_at": "2025-01-14T06:46:21Z",
"pushed_at": "2025-01-02T16:07:23Z", "pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 441, "stargazers_count": 442,
"watchers_count": 441, "watchers_count": 442,
"has_discussions": false, "has_discussions": false,
"forks_count": 103, "forks_count": 104,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 103, "forks": 104,
"watchers": 441, "watchers": 442,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false, "fork": false,
"created_at": "2024-12-23T07:20:47Z", "created_at": "2024-12-23T07:20:47Z",
"updated_at": "2025-01-11T17:38:38Z", "updated_at": "2025-01-14T09:52:58Z",
"pushed_at": "2024-12-23T07:30:27Z", "pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 66, "stargazers_count": 68,
"watchers_count": 66, "watchers_count": 68,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -212,7 +212,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 66, "watchers": 68,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -231,10 +231,10 @@
"description": "CVE-2024-50379利用", "description": "CVE-2024-50379利用",
"fork": false, "fork": false,
"created_at": "2024-12-23T14:11:46Z", "created_at": "2024-12-23T14:11:46Z",
"updated_at": "2024-12-23T14:13:15Z", "updated_at": "2025-01-14T09:50:55Z",
"pushed_at": "2024-12-23T14:13:11Z", "pushed_at": "2024-12-23T14:13:11Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -262,10 +262,10 @@
"description": "CVE-2024-50379-exp", "description": "CVE-2024-50379-exp",
"fork": false, "fork": false,
"created_at": "2024-12-25T02:41:31Z", "created_at": "2024-12-25T02:41:31Z",
"updated_at": "2025-01-13T14:24:53Z", "updated_at": "2025-01-14T11:50:00Z",
"pushed_at": "2024-12-31T07:11:13Z", "pushed_at": "2024-12-31T07:11:13Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -274,7 +274,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 7, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "Escape macOS Sandbox using sharedfilelistd exploit", "description": "Escape macOS Sandbox using sharedfilelistd exploit",
"fork": false, "fork": false,
"created_at": "2025-01-08T09:55:44Z", "created_at": "2025-01-08T09:55:44Z",
"updated_at": "2025-01-14T06:17:53Z", "updated_at": "2025-01-14T11:32:32Z",
"pushed_at": "2025-01-09T06:34:50Z", "pushed_at": "2025-01-09T06:34:50Z",
"stargazers_count": 41, "stargazers_count": 43,
"watchers_count": 41, "watchers_count": 43,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 41, "watchers": 43,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 37, "stargazers_count": 37,
"watchers_count": 37, "watchers_count": 37,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 11,
"watchers": 37, "watchers": 37,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
@ -50,13 +50,13 @@
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -40807,7 +40807,6 @@
- [antunesmpedro/CVE-2018-6574](https://github.com/antunesmpedro/CVE-2018-6574) - [antunesmpedro/CVE-2018-6574](https://github.com/antunesmpedro/CVE-2018-6574)
- [jahwni/CVE-2018-6574](https://github.com/jahwni/CVE-2018-6574) - [jahwni/CVE-2018-6574](https://github.com/jahwni/CVE-2018-6574)
- [NsByte/CVE-2018-6574](https://github.com/NsByte/CVE-2018-6574) - [NsByte/CVE-2018-6574](https://github.com/NsByte/CVE-2018-6574)
- [Zeeshan12340/CVE-2018-6574](https://github.com/Zeeshan12340/CVE-2018-6574)
- [moTorky/CVE-2018-6574-POC](https://github.com/moTorky/CVE-2018-6574-POC) - [moTorky/CVE-2018-6574-POC](https://github.com/moTorky/CVE-2018-6574-POC)
- [Ashved9/Orange](https://github.com/Ashved9/Orange) - [Ashved9/Orange](https://github.com/Ashved9/Orange)
- [zerbaliy3v/cve-2018-6574-exploit](https://github.com/zerbaliy3v/cve-2018-6574-exploit) - [zerbaliy3v/cve-2018-6574-exploit](https://github.com/zerbaliy3v/cve-2018-6574-exploit)