Auto Update 2024/12/26 06:31:51

This commit is contained in:
motikan2010-bot 2024-12-26 15:31:51 +09:00
parent a4fea4b262
commit 65e6b93ee1
45 changed files with 200 additions and 168 deletions

View file

@ -173,10 +173,10 @@
"description": "ActiveMQ系列漏洞探测利用工具包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞CVE-2016-3088支持批量探测利用。",
"fork": false,
"created_at": "2022-04-02T08:40:10Z",
"updated_at": "2024-08-11T01:57:49Z",
"updated_at": "2024-12-26T03:30:18Z",
"pushed_at": "2022-04-02T08:55:07Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -185,7 +185,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -417,12 +417,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-25T08:49:58Z",
"updated_at": "2024-12-26T03:38:47Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -436,8 +436,8 @@
"tools"
],
"visibility": "public",
"forks": 15,
"watchers": 164,
"forks": 14,
"watchers": 165,
"score": 0,
"subscribers_count": 2
},

View file

@ -107,19 +107,19 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2024-12-25T14:32:19Z",
"updated_at": "2024-12-26T00:10:58Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 55,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 288,
"forks": 56,
"watchers": 289,
"score": 0,
"subscribers_count": 8
},

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-18T12:07:09Z",
"updated_at": "2024-12-26T03:18:18Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4147,
"watchers_count": 4147,
"stargazers_count": 4146,
"watchers_count": 4146,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4147,
"watchers": 4146,
"score": 0,
"subscribers_count": 149
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 405,
"watchers_count": 405,
"has_discussions": false,
"forks_count": 64,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 64,
"forks": 63,
"watchers": 405,
"score": 0,
"subscribers_count": 10

View file

@ -14,10 +14,10 @@
"description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞",
"fork": false,
"created_at": "2021-01-15T08:57:09Z",
"updated_at": "2021-10-19T07:11:42Z",
"updated_at": "2024-12-26T03:59:50Z",
"pushed_at": "2021-01-15T08:59:18Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-18T12:07:09Z",
"updated_at": "2024-12-26T03:18:18Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4147,
"watchers_count": 4147,
"stargazers_count": 4146,
"watchers_count": 4146,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4147,
"watchers": 4146,
"score": 0,
"subscribers_count": 149
},
@ -985,5 +985,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 908439500,
"name": "CVE-2020-14882-HoaxShell",
"full_name": "AleksaZatezalo\/CVE-2020-14882-HoaxShell",
"owner": {
"login": "AleksaZatezalo",
"id": 59803757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59803757?v=4",
"html_url": "https:\/\/github.com\/AleksaZatezalo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AleksaZatezalo\/CVE-2020-14882-HoaxShell",
"description": null,
"fork": false,
"created_at": "2024-12-26T04:45:46Z",
"updated_at": "2024-12-26T04:47:06Z",
"pushed_at": "2024-12-26T04:47:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -81,13 +81,13 @@
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 25,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 23,
"watchers": 48,
"score": 0,
"subscribers_count": 2

View file

@ -981,12 +981,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-25T08:49:58Z",
"updated_at": "2024-12-26T03:38:47Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1000,8 +1000,8 @@
"tools"
],
"visibility": "public",
"forks": 15,
"watchers": 164,
"forks": 14,
"watchers": 165,
"score": 0,
"subscribers_count": 2
}

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-25T09:32:14Z",
"updated_at": "2024-12-26T06:14:49Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1349,
"watchers_count": 1349,
"stargazers_count": 1351,
"watchers_count": 1351,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1349,
"watchers": 1351,
"score": 0,
"subscribers_count": 15
}

View file

@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-24T10:18:05Z",
"updated_at": "2024-12-26T05:22:40Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1098,
"watchers_count": 1098,
"stargazers_count": 1099,
"watchers_count": 1099,
"has_discussions": false,
"forks_count": 191,
"allow_forking": true,
@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 191,
"watchers": 1098,
"watchers": 1099,
"score": 0,
"subscribers_count": 14
},

View file

@ -2027,10 +2027,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-11-12T20:26:27Z",
"updated_at": "2024-12-26T05:13:44Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 638,
"watchers_count": 638,
"stargazers_count": 637,
"watchers_count": 637,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -2051,7 +2051,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 638,
"watchers": 637,
"score": 0,
"subscribers_count": 28
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-25T09:32:14Z",
"updated_at": "2024-12-26T06:14:49Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1349,
"watchers_count": 1349,
"stargazers_count": 1351,
"watchers_count": 1351,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1349,
"watchers": 1351,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-12-24T05:42:08Z",
"updated_at": "2024-12-26T05:57:27Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 301,
"watchers": 302,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false,
"created_at": "2023-05-18T10:30:49Z",
"updated_at": "2024-12-09T09:20:31Z",
"updated_at": "2024-12-26T02:20:05Z",
"pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Lexmark CVE-2023-26067",
"fork": false,
"created_at": "2023-08-07T20:55:15Z",
"updated_at": "2024-07-18T11:40:15Z",
"updated_at": "2024-12-26T01:24:31Z",
"pushed_at": "2023-08-08T13:54:06Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 4
}

View file

@ -582,10 +582,10 @@
"description": "CVE-2023-38646 Metabase RCE",
"fork": false,
"created_at": "2023-10-11T03:18:09Z",
"updated_at": "2024-11-29T23:36:25Z",
"updated_at": "2024-12-26T05:01:51Z",
"pushed_at": "2023-10-11T04:06:43Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -599,7 +599,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-24T14:37:11Z",
"updated_at": "2024-12-26T06:26:47Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 47,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-24T13:37:29Z",
"updated_at": "2024-12-26T03:33:10Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1313,
"watchers_count": 1313,
"stargazers_count": 1312,
"watchers_count": 1312,
"has_discussions": false,
"forks_count": 221,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1313,
"watchers": 1312,
"score": 0,
"subscribers_count": 21
},

View file

@ -45,19 +45,19 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-12-18T05:48:13Z",
"updated_at": "2024-12-26T05:27:55Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 230,
"watchers_count": 230,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 228,
"forks": 29,
"watchers": 230,
"score": 0,
"subscribers_count": 4
},
@ -76,10 +76,10 @@
"description": "CVE-2023-46604",
"fork": false,
"created_at": "2023-10-27T12:22:43Z",
"updated_at": "2024-11-09T17:57:37Z",
"updated_at": "2024-12-26T03:27:25Z",
"pushed_at": "2023-11-03T14:14:31Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 0
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -76,10 +76,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-12-17T08:07:54Z",
"updated_at": "2024-12-26T06:23:07Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 126,
"watchers": 127,
"score": 0,
"subscribers_count": 5
},

View file

@ -403,6 +403,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false,
"created_at": "2024-05-31T20:11:37Z",
"updated_at": "2024-11-20T16:30:48Z",
"updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-06-08T09:12:43Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 61,
"watchers": 60,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-12-22T07:18:57Z",
"updated_at": "2024-12-26T06:26:44Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3500,
"watchers_count": 3500,
"stargazers_count": 3499,
"watchers_count": 3499,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 3500,
"watchers": 3499,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": "Apache OfBiz vulns",
"fork": false,
"created_at": "2024-04-10T13:22:11Z",
"updated_at": "2024-11-30T07:55:30Z",
"updated_at": "2024-12-26T06:26:45Z",
"pushed_at": "2024-08-05T06:40:47Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -207,10 +207,10 @@
"description": "GeoServer Remote Code Execution",
"fork": false,
"created_at": "2024-07-30T18:43:40Z",
"updated_at": "2024-12-25T19:00:32Z",
"updated_at": "2024-12-26T04:35:42Z",
"pushed_at": "2024-08-02T14:57:26Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -219,7 +219,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 1
},
@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-12-22T12:02:20Z",
"updated_at": "2024-12-26T04:19:46Z",
"pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-12-22T20:26:26Z",
"updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 114,
"watchers": 113,
"score": 0,
"subscribers_count": 2
},

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-12-25T08:57:08Z",
"updated_at": "2024-12-26T02:57:45Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 641,
"watchers_count": 641,
"stargazers_count": 642,
"watchers_count": 642,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 641,
"watchers": 642,
"score": 0,
"subscribers_count": 4
},

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-24T14:37:11Z",
"updated_at": "2024-12-26T06:26:47Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 47,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
"fork": false,
"created_at": "2024-12-03T12:44:07Z",
"updated_at": "2024-12-07T18:03:18Z",
"updated_at": "2024-12-26T01:27:56Z",
"pushed_at": "2024-12-03T12:56:52Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-12-20T09:02:13Z",
"updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 244,
"watchers_count": 244,
"stargazers_count": 243,
"watchers_count": 243,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 244,
"watchers": 243,
"score": 0,
"subscribers_count": 4
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-25T21:53:18Z",
"updated_at": "2024-12-26T03:14:09Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -212,9 +212,9 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 35,
"watchers": 38,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 907408912,
@ -262,8 +262,8 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-25T07:54:45Z",
"pushed_at": "2024-12-25T07:54:42Z",
"updated_at": "2024-12-26T06:28:50Z",
"pushed_at": "2024-12-26T06:28:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -276,7 +276,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 908327097,
@ -307,7 +307,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 908364457,
@ -338,6 +338,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -65,6 +65,6 @@
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-25T09:09:58Z",
"updated_at": "2024-12-26T01:46:25Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 3
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-11-20T16:30:52Z",
"updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 381,
"watchers_count": 381,
"stargazers_count": 380,
"watchers_count": 380,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 381,
"watchers": 380,
"score": 0,
"subscribers_count": 8
},
@ -1159,10 +1159,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-02T14:41:43Z",
"updated_at": "2024-12-14T03:39:21Z",
"updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -1181,7 +1181,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 32,
"watchers": 31,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-12-22T21:34:29Z",
"updated_at": "2024-12-26T02:57:19Z",
"pushed_at": "2024-12-22T21:34:26Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -97,6 +97,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -33199,6 +33199,7 @@
- [LucasPDiniz/CVE-2020-14882](https://github.com/LucasPDiniz/CVE-2020-14882)
- [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882)
- [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC)
- [AleksaZatezalo/CVE-2020-14882-HoaxShell](https://github.com/AleksaZatezalo/CVE-2020-14882-HoaxShell)
### CVE-2020-14883 (2020-10-21)