Auto Update 2024/10/02 12:31:54

This commit is contained in:
motikan2010-bot 2024-10-02 21:31:54 +09:00
parent 08e7934875
commit 5d13913aac
46 changed files with 195 additions and 164 deletions

View file

@ -13,10 +13,10 @@
"description": "cve-2001-1473",
"fork": false,
"created_at": "2023-12-17T14:11:13Z",
"updated_at": "2023-12-17T14:19:43Z",
"updated_at": "2024-10-02T10:29:15Z",
"pushed_at": "2023-12-17T14:26:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-01T03:45:36Z",
"updated_at": "2024-10-02T10:34:21Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1985,
"watchers_count": 1985,
"stargazers_count": 1986,
"watchers_count": 1986,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1985,
"watchers": 1986,
"score": 0,
"subscribers_count": 36
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-01T03:45:36Z",
"updated_at": "2024-10-02T10:34:21Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1985,
"watchers_count": 1985,
"stargazers_count": 1986,
"watchers_count": 1986,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1985,
"watchers": 1986,
"score": 0,
"subscribers_count": 36
},

View file

@ -403,10 +403,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-09-25T21:01:45Z",
"updated_at": "2024-10-02T09:57:08Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -423,7 +423,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-01T03:45:36Z",
"updated_at": "2024-10-02T10:34:21Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1985,
"watchers_count": 1985,
"stargazers_count": 1986,
"watchers_count": 1986,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1985,
"watchers": 1986,
"score": 0,
"subscribers_count": 36
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ",
"fork": false,
"created_at": "2017-11-19T16:50:39Z",
"updated_at": "2024-08-14T06:04:59Z",
"updated_at": "2024-10-02T09:53:46Z",
"pushed_at": "2022-03-07T20:04:08Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 1
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-09-30T15:00:59Z",
"pushed_at": "2024-09-30T15:00:57Z",
"pushed_at": "2024-10-02T08:19:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-01T03:45:36Z",
"updated_at": "2024-10-02T10:34:21Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1985,
"watchers_count": 1985,
"stargazers_count": 1986,
"watchers_count": 1986,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1985,
"watchers": 1986,
"score": 0,
"subscribers_count": 36
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 28,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 27,
"watchers": 178,
"score": 0,
"subscribers_count": 12

View file

@ -13,10 +13,10 @@
"description": "Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal \/ Authenticated Arbitrary File Deletion in Python3",
"fork": false,
"created_at": "2023-02-24T10:58:53Z",
"updated_at": "2024-08-01T17:30:37Z",
"updated_at": "2024-10-02T09:49:21Z",
"pushed_at": "2023-02-27T16:32:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-09-30T09:18:42Z",
"updated_at": "2024-10-02T08:08:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4102,
"watchers_count": 4102,
"stargazers_count": 4103,
"watchers_count": 4103,
"has_discussions": false,
"forks_count": 1094,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1094,
"watchers": 4102,
"watchers": 4103,
"score": 0,
"subscribers_count": 148
},

View file

@ -214,5 +214,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 657123561,
"name": "vnc-lab-cve-2019-17662",
"full_name": "medarov411\/vnc-lab-cve-2019-17662",
"owner": {
"login": "medarov411",
"id": 60567375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60567375?v=4",
"html_url": "https:\/\/github.com\/medarov411"
},
"html_url": "https:\/\/github.com\/medarov411\/vnc-lab-cve-2019-17662",
"description": null,
"fork": false,
"created_at": "2023-06-22T11:19:27Z",
"updated_at": "2024-10-02T10:33:46Z",
"pushed_at": "2023-06-22T11:24:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-01T03:45:36Z",
"updated_at": "2024-10-02T10:34:21Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1985,
"watchers_count": 1985,
"stargazers_count": 1986,
"watchers_count": 1986,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1985,
"watchers": 1986,
"score": 0,
"subscribers_count": 36
}

View file

@ -13,10 +13,10 @@
"description": "poc for CVE-2020-13519(still under construction). needs refining , testing , tunning...",
"fork": false,
"created_at": "2024-09-30T06:28:49Z",
"updated_at": "2024-09-30T10:57:19Z",
"updated_at": "2024-10-02T08:18:10Z",
"pushed_at": "2024-09-30T06:30:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-09-30T09:18:42Z",
"updated_at": "2024-10-02T08:08:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4102,
"watchers_count": 4102,
"stargazers_count": 4103,
"watchers_count": 4103,
"has_discussions": false,
"forks_count": 1094,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1094,
"watchers": 4102,
"watchers": 4103,
"score": 0,
"subscribers_count": 148
},

View file

@ -919,10 +919,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-09-25T21:01:45Z",
"updated_at": "2024-10-02T09:57:08Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -939,7 +939,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-01T03:45:36Z",
"updated_at": "2024-10-02T10:34:21Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1985,
"watchers_count": 1985,
"stargazers_count": 1986,
"watchers_count": 1986,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1985,
"watchers": 1986,
"score": 0,
"subscribers_count": 36
},

View file

@ -150,10 +150,10 @@
"description": "Harnessing AI to hack the limits of possibility",
"fork": false,
"created_at": "2024-09-20T01:10:48Z",
"updated_at": "2024-09-25T19:08:31Z",
"updated_at": "2024-10-02T10:32:35Z",
"pushed_at": "2024-09-20T23:17:48Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -169,7 +169,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 4
}

View file

@ -316,10 +316,10 @@
"description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution",
"fork": false,
"created_at": "2022-04-16T22:49:47Z",
"updated_at": "2024-08-09T12:11:53Z",
"updated_at": "2024-10-02T07:11:43Z",
"pushed_at": "2022-06-07T23:09:29Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": true,
"forks_count": 4,
"allow_forking": true,
@ -341,7 +341,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 2
},

View file

@ -936,10 +936,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-10-02T03:41:49Z",
"updated_at": "2024-10-02T11:39:03Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1057,
"watchers_count": 1057,
"stargazers_count": 1059,
"watchers_count": 1059,
"has_discussions": false,
"forks_count": 188,
"allow_forking": true,
@ -950,7 +950,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1057,
"watchers": 1059,
"score": 0,
"subscribers_count": 13
},

View file

@ -3296,10 +3296,10 @@
"description": "Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)",
"fork": false,
"created_at": "2022-11-22T14:09:18Z",
"updated_at": "2024-09-22T10:40:33Z",
"updated_at": "2024-10-02T07:36:39Z",
"pushed_at": "2022-11-22T14:42:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -3308,7 +3308,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-09-16T19:09:25Z",
"updated_at": "2024-10-02T07:54:03Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 797,
"watchers_count": 797,
"stargazers_count": 798,
"watchers_count": 798,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 797,
"watchers": 798,
"score": 0,
"subscribers_count": 11
},
@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2024-09-29T21:17:17Z",
"pushed_at": "2024-10-02T09:53:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
@ -108,13 +108,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Security issue in the hypervisor firmware of some older Qualcomm chipsets",
"fork": false,
"created_at": "2022-12-27T19:48:30Z",
"updated_at": "2024-10-01T18:27:21Z",
"updated_at": "2024-10-02T09:44:04Z",
"pushed_at": "2022-12-27T20:32:37Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": true,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -705,10 +705,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
"updated_at": "2024-09-19T11:49:36Z",
"updated_at": "2024-10-02T08:25:37Z",
"pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 332,
"watchers_count": 332,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -717,7 +717,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 331,
"watchers": 332,
"score": 0,
"subscribers_count": 7
},

View file

@ -617,7 +617,7 @@
"fork": false,
"created_at": "2024-03-04T19:09:57Z",
"updated_at": "2024-07-31T10:07:52Z",
"pushed_at": "2024-09-27T08:56:46Z",
"pushed_at": "2024-10-02T09:00:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
"fork": false,
"created_at": "2023-03-27T08:53:04Z",
"updated_at": "2024-09-27T13:22:26Z",
"updated_at": "2024-10-02T09:35:45Z",
"pushed_at": "2023-04-04T05:26:59Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 301,
"watchers": 302,
"score": 0,
"subscribers_count": 3
}

View file

@ -262,10 +262,10 @@
"description": "Metabase Pre-auth RCE",
"fork": false,
"created_at": "2023-08-02T13:21:58Z",
"updated_at": "2024-07-02T10:01:40Z",
"updated_at": "2024-10-02T09:48:31Z",
"pushed_at": "2023-08-03T10:07:15Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -285,7 +285,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -498,10 +498,10 @@
"description": "This is a script written in Python that allows the exploitation of the Metabase's software security flaw described in CVE-2023-38646.",
"fork": false,
"created_at": "2023-10-09T00:26:38Z",
"updated_at": "2024-09-04T14:54:02Z",
"updated_at": "2024-10-02T09:48:30Z",
"pushed_at": "2024-07-07T17:44:16Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -516,7 +516,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
@ -749,10 +749,10 @@
"description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)",
"fork": false,
"created_at": "2023-10-15T01:29:37Z",
"updated_at": "2024-06-26T15:26:24Z",
"updated_at": "2024-10-02T09:48:29Z",
"pushed_at": "2023-10-15T01:51:31Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -761,7 +761,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept code for Android APEX key reuse vulnerability",
"fork": false,
"created_at": "2024-01-26T21:17:38Z",
"updated_at": "2024-09-04T10:17:52Z",
"updated_at": "2024-10-02T09:38:43Z",
"pushed_at": "2024-01-31T19:33:59Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-10-02T04:42:21Z",
"updated_at": "2024-10-02T08:33:08Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1183,
"watchers_count": 1183,
"stargazers_count": 1184,
"watchers_count": 1184,
"has_discussions": false,
"forks_count": 201,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 201,
"watchers": 1183,
"watchers": 1184,
"score": 0,
"subscribers_count": 21
},

View file

@ -255,10 +255,10 @@
"description": "This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol.",
"fork": false,
"created_at": "2023-11-12T11:26:46Z",
"updated_at": "2024-08-12T01:54:00Z",
"updated_at": "2024-10-02T09:38:18Z",
"pushed_at": "2024-01-24T13:44:29Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -267,7 +267,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-10-01T13:25:38Z",
"updated_at": "2024-10-02T11:09:40Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 239,
"watchers": 240,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-09-29T17:42:53Z",
"updated_at": "2024-10-02T09:27:22Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 672,
"watchers_count": 672,
"stargazers_count": 673,
"watchers_count": 673,
"has_discussions": false,
"forks_count": 149,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 149,
"watchers": 672,
"watchers": 673,
"score": 0,
"subscribers_count": 10
},

View file

@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-10-01T21:30:52Z",
"updated_at": "2024-10-02T06:33:51Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 385,
"watchers_count": 385,
"stargazers_count": 386,
"watchers_count": 386,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 385,
"watchers": 386,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ROUGHT SKELLETON ATM. WILL EVENTUALLY TURN IT INTO FULL EOP",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
"updated_at": "2024-10-01T22:22:24Z",
"updated_at": "2024-10-02T12:25:39Z",
"pushed_at": "2024-10-01T22:22:21Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
"fork": false,
"created_at": "2024-09-13T00:41:32Z",
"updated_at": "2024-10-02T05:47:46Z",
"updated_at": "2024-10-02T09:13:21Z",
"pushed_at": "2024-10-01T00:57:03Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 39,
"watchers": 42,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,20 +43,20 @@
"description": null,
"fork": false,
"created_at": "2024-09-28T08:29:06Z",
"updated_at": "2024-10-02T03:43:21Z",
"updated_at": "2024-10-02T11:45:24Z",
"pushed_at": "2024-09-28T08:34:05Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 22,
"forks": 9,
"watchers": 23,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
"fork": false,
"created_at": "2024-08-29T16:40:49Z",
"updated_at": "2024-10-01T18:57:32Z",
"updated_at": "2024-10-02T06:56:23Z",
"pushed_at": "2024-09-29T21:58:19Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 42,
"forks": 8,
"watchers": 43,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.",
"fork": false,
"created_at": "2024-09-16T19:04:57Z",
"updated_at": "2024-10-01T23:32:01Z",
"updated_at": "2024-10-02T12:25:40Z",
"pushed_at": "2024-09-16T19:44:54Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 5
}

View file

@ -65,6 +65,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -35,6 +35,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -35598,6 +35598,7 @@
- [Tamagaft/CVE-2019-17662](https://github.com/Tamagaft/CVE-2019-17662)
- [bl4ck574r/CVE-2019-17662](https://github.com/bl4ck574r/CVE-2019-17662)
- [thomas-osgood/CVE-2019-17662](https://github.com/thomas-osgood/CVE-2019-17662)
- [medarov411/vnc-lab-cve-2019-17662](https://github.com/medarov411/vnc-lab-cve-2019-17662)
### CVE-2019-17666 (2019-10-17)