Auto Update 2024/12/26 06:31:51

This commit is contained in:
motikan2010-bot 2024-12-26 15:31:51 +09:00
parent a4fea4b262
commit 65e6b93ee1
45 changed files with 200 additions and 168 deletions

View file

@ -173,10 +173,10 @@
"description": "ActiveMQ系列漏洞探测利用工具包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞CVE-2016-3088支持批量探测利用。", "description": "ActiveMQ系列漏洞探测利用工具包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞CVE-2016-3088支持批量探测利用。",
"fork": false, "fork": false,
"created_at": "2022-04-02T08:40:10Z", "created_at": "2022-04-02T08:40:10Z",
"updated_at": "2024-08-11T01:57:49Z", "updated_at": "2024-12-26T03:30:18Z",
"pushed_at": "2022-04-02T08:55:07Z", "pushed_at": "2022-04-02T08:55:07Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -185,7 +185,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 16, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -417,12 +417,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false, "fork": false,
"created_at": "2024-08-29T06:38:16Z", "created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-25T08:49:58Z", "updated_at": "2024-12-26T03:38:47Z",
"pushed_at": "2024-11-13T03:12:58Z", "pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 164, "stargazers_count": 165,
"watchers_count": 164, "watchers_count": 165,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -436,8 +436,8 @@
"tools" "tools"
], ],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 14,
"watchers": 164, "watchers": 165,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -107,19 +107,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-06-24T15:33:50Z", "created_at": "2019-06-24T15:33:50Z",
"updated_at": "2024-12-25T14:32:19Z", "updated_at": "2024-12-26T00:10:58Z",
"pushed_at": "2020-11-09T07:33:12Z", "pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 288, "stargazers_count": 289,
"watchers_count": 288, "watchers_count": 289,
"has_discussions": false, "has_discussions": false,
"forks_count": 55, "forks_count": 56,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 55, "forks": 56,
"watchers": 288, "watchers": 289,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-18T12:07:09Z", "updated_at": "2024-12-26T03:18:18Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4147, "stargazers_count": 4146,
"watchers_count": 4147, "watchers_count": 4146,
"has_discussions": false, "has_discussions": false,
"forks_count": 1099, "forks_count": 1099,
"allow_forking": true, "allow_forking": true,
@ -77,7 +77,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1099, "forks": 1099,
"watchers": 4147, "watchers": 4146,
"score": 0, "score": 0,
"subscribers_count": 149 "subscribers_count": 149
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 405, "stargazers_count": 405,
"watchers_count": 405, "watchers_count": 405,
"has_discussions": false, "has_discussions": false,
"forks_count": 64, "forks_count": 63,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 64, "forks": 63,
"watchers": 405, "watchers": 405,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10

View file

@ -14,10 +14,10 @@
"description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞", "description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞",
"fork": false, "fork": false,
"created_at": "2021-01-15T08:57:09Z", "created_at": "2021-01-15T08:57:09Z",
"updated_at": "2021-10-19T07:11:42Z", "updated_at": "2024-12-26T03:59:50Z",
"pushed_at": "2021-01-15T08:59:18Z", "pushed_at": "2021-01-15T08:59:18Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-18T12:07:09Z", "updated_at": "2024-12-26T03:18:18Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4147, "stargazers_count": 4146,
"watchers_count": 4147, "watchers_count": 4146,
"has_discussions": false, "has_discussions": false,
"forks_count": 1099, "forks_count": 1099,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1099, "forks": 1099,
"watchers": 4147, "watchers": 4146,
"score": 0, "score": 0,
"subscribers_count": 149 "subscribers_count": 149
}, },
@ -985,5 +985,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 908439500,
"name": "CVE-2020-14882-HoaxShell",
"full_name": "AleksaZatezalo\/CVE-2020-14882-HoaxShell",
"owner": {
"login": "AleksaZatezalo",
"id": 59803757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59803757?v=4",
"html_url": "https:\/\/github.com\/AleksaZatezalo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AleksaZatezalo\/CVE-2020-14882-HoaxShell",
"description": null,
"fork": false,
"created_at": "2024-12-26T04:45:46Z",
"updated_at": "2024-12-26T04:47:06Z",
"pushed_at": "2024-12-26T04:47:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -81,13 +81,13 @@
"stargazers_count": 48, "stargazers_count": 48,
"watchers_count": 48, "watchers_count": 48,
"has_discussions": false, "has_discussions": false,
"forks_count": 25, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 25, "forks": 23,
"watchers": 48, "watchers": 48,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -981,12 +981,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false, "fork": false,
"created_at": "2024-08-29T06:38:16Z", "created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-25T08:49:58Z", "updated_at": "2024-12-26T03:38:47Z",
"pushed_at": "2024-11-13T03:12:58Z", "pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 164, "stargazers_count": 165,
"watchers_count": 164, "watchers_count": 165,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -1000,8 +1000,8 @@
"tools" "tools"
], ],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 14,
"watchers": 164, "watchers": 165,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-25T09:32:14Z", "updated_at": "2024-12-26T06:14:49Z",
"pushed_at": "2024-04-25T06:09:38Z", "pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1349, "stargazers_count": 1351,
"watchers_count": 1349, "watchers_count": 1351,
"has_discussions": false, "has_discussions": false,
"forks_count": 166, "forks_count": 166,
"allow_forking": true, "allow_forking": true,
@ -867,7 +867,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 166, "forks": 166,
"watchers": 1349, "watchers": 1351,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2022-01-26T14:26:10Z", "created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-24T10:18:05Z", "updated_at": "2024-12-26T05:22:40Z",
"pushed_at": "2022-06-21T14:52:05Z", "pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1098, "stargazers_count": 1099,
"watchers_count": 1098, "watchers_count": 1099,
"has_discussions": false, "has_discussions": false,
"forks_count": 191, "forks_count": 191,
"allow_forking": true, "allow_forking": true,
@ -981,7 +981,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 191, "forks": 191,
"watchers": 1098, "watchers": 1099,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },

View file

@ -2027,10 +2027,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC", "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false, "fork": false,
"created_at": "2021-12-12T00:29:03Z", "created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-11-12T20:26:27Z", "updated_at": "2024-12-26T05:13:44Z",
"pushed_at": "2022-03-10T18:44:50Z", "pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 638, "stargazers_count": 637,
"watchers_count": 638, "watchers_count": 637,
"has_discussions": false, "has_discussions": false,
"forks_count": 98, "forks_count": 98,
"allow_forking": true, "allow_forking": true,
@ -2051,7 +2051,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 98, "forks": 98,
"watchers": 638, "watchers": 637,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-25T09:32:14Z", "updated_at": "2024-12-26T06:14:49Z",
"pushed_at": "2024-04-25T06:09:38Z", "pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1349, "stargazers_count": 1351,
"watchers_count": 1349, "watchers_count": 1351,
"has_discussions": false, "has_discussions": false,
"forks_count": 166, "forks_count": 166,
"allow_forking": true, "allow_forking": true,
@ -811,7 +811,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 166, "forks": 166,
"watchers": 1349, "watchers": 1351,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -14,10 +14,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false, "fork": false,
"created_at": "2022-09-12T19:22:44Z", "created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-12-24T05:42:08Z", "updated_at": "2024-12-26T05:57:27Z",
"pushed_at": "2022-09-19T19:41:34Z", "pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 301, "stargazers_count": 302,
"watchers_count": 301, "watchers_count": 302,
"has_discussions": false, "has_discussions": false,
"forks_count": 42, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 42,
"watchers": 301, "watchers": 302,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false, "fork": false,
"created_at": "2023-05-18T10:30:49Z", "created_at": "2023-05-18T10:30:49Z",
"updated_at": "2024-12-09T09:20:31Z", "updated_at": "2024-12-26T02:20:05Z",
"pushed_at": "2023-05-18T10:38:57Z", "pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 55, "stargazers_count": 56,
"watchers_count": 55, "watchers_count": 56,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 55, "watchers": 56,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,10 +14,10 @@
"description": "Lexmark CVE-2023-26067", "description": "Lexmark CVE-2023-26067",
"fork": false, "fork": false,
"created_at": "2023-08-07T20:55:15Z", "created_at": "2023-08-07T20:55:15Z",
"updated_at": "2024-07-18T11:40:15Z", "updated_at": "2024-12-26T01:24:31Z",
"pushed_at": "2023-08-08T13:54:06Z", "pushed_at": "2023-08-08T13:54:06Z",
"stargazers_count": 22, "stargazers_count": 23,
"watchers_count": 22, "watchers_count": 23,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 22, "watchers": 23,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -582,10 +582,10 @@
"description": "CVE-2023-38646 Metabase RCE", "description": "CVE-2023-38646 Metabase RCE",
"fork": false, "fork": false,
"created_at": "2023-10-11T03:18:09Z", "created_at": "2023-10-11T03:18:09Z",
"updated_at": "2024-11-29T23:36:25Z", "updated_at": "2024-12-26T05:01:51Z",
"pushed_at": "2023-10-11T04:06:43Z", "pushed_at": "2023-10-11T04:06:43Z",
"stargazers_count": 50, "stargazers_count": 51,
"watchers_count": 50, "watchers_count": 51,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -599,7 +599,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 50, "watchers": 51,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-24T14:37:11Z", "updated_at": "2024-12-26T06:26:47Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 47, "stargazers_count": 46,
"watchers_count": 47, "watchers_count": 46,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -37,7 +37,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 47, "watchers": 46,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-24T13:37:29Z", "updated_at": "2024-12-26T03:33:10Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1313, "stargazers_count": 1312,
"watchers_count": 1313, "watchers_count": 1312,
"has_discussions": false, "has_discussions": false,
"forks_count": 221, "forks_count": 221,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 221, "forks": 221,
"watchers": 1313, "watchers": 1312,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

View file

@ -45,19 +45,19 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具", "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false, "fork": false,
"created_at": "2023-10-27T05:57:21Z", "created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-12-18T05:48:13Z", "updated_at": "2024-12-26T05:27:55Z",
"pushed_at": "2024-01-29T02:28:11Z", "pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 228, "stargazers_count": 230,
"watchers_count": 228, "watchers_count": 230,
"has_discussions": false, "has_discussions": false,
"forks_count": 28, "forks_count": 29,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 28, "forks": 29,
"watchers": 228, "watchers": 230,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -76,10 +76,10 @@
"description": "CVE-2023-46604", "description": "CVE-2023-46604",
"fork": false, "fork": false,
"created_at": "2023-10-27T12:22:43Z", "created_at": "2023-10-27T12:22:43Z",
"updated_at": "2024-11-09T17:57:37Z", "updated_at": "2024-12-26T03:27:25Z",
"pushed_at": "2023-11-03T14:14:31Z", "pushed_at": "2023-11-03T14:14:31Z",
"stargazers_count": 62, "stargazers_count": 63,
"watchers_count": 62, "watchers_count": 63,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 62, "watchers": 63,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -90,6 +90,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -76,10 +76,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ", "description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false, "fork": false,
"created_at": "2024-03-13T09:17:28Z", "created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-12-17T08:07:54Z", "updated_at": "2024-12-26T06:23:07Z",
"pushed_at": "2024-03-16T00:35:12Z", "pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 126, "stargazers_count": 127,
"watchers_count": 126, "watchers_count": 127,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 126, "watchers": 127,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -403,6 +403,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )", "description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false, "fork": false,
"created_at": "2024-05-31T20:11:37Z", "created_at": "2024-05-31T20:11:37Z",
"updated_at": "2024-11-20T16:30:48Z", "updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-06-08T09:12:43Z", "pushed_at": "2024-06-08T09:12:43Z",
"stargazers_count": 61, "stargazers_count": 60,
"watchers_count": 61, "watchers_count": 60,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -33,7 +33,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 61, "watchers": 60,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false, "fork": false,
"created_at": "2024-04-01T14:28:09Z", "created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-12-22T07:18:57Z", "updated_at": "2024-12-26T06:26:44Z",
"pushed_at": "2024-04-03T04:58:50Z", "pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3500, "stargazers_count": 3499,
"watchers_count": 3500, "watchers_count": 3499,
"has_discussions": false, "has_discussions": false,
"forks_count": 240, "forks_count": 240,
"allow_forking": true, "allow_forking": true,
@ -964,7 +964,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 240, "forks": 240,
"watchers": 3500, "watchers": 3499,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
}, },

View file

@ -14,10 +14,10 @@
"description": "Apache OfBiz vulns", "description": "Apache OfBiz vulns",
"fork": false, "fork": false,
"created_at": "2024-04-10T13:22:11Z", "created_at": "2024-04-10T13:22:11Z",
"updated_at": "2024-11-30T07:55:30Z", "updated_at": "2024-12-26T06:26:45Z",
"pushed_at": "2024-08-05T06:40:47Z", "pushed_at": "2024-08-05T06:40:47Z",
"stargazers_count": 8, "stargazers_count": 7,
"watchers_count": 8, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 8, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -207,10 +207,10 @@
"description": "GeoServer Remote Code Execution", "description": "GeoServer Remote Code Execution",
"fork": false, "fork": false,
"created_at": "2024-07-30T18:43:40Z", "created_at": "2024-07-30T18:43:40Z",
"updated_at": "2024-12-25T19:00:32Z", "updated_at": "2024-12-26T04:35:42Z",
"pushed_at": "2024-08-02T14:57:26Z", "pushed_at": "2024-08-02T14:57:26Z",
"stargazers_count": 76, "stargazers_count": 77,
"watchers_count": 76, "watchers_count": 77,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -219,7 +219,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 76, "watchers": 77,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具", "description": "geoserver图形化漏洞利用工具",
"fork": false, "fork": false,
"created_at": "2024-10-05T10:08:55Z", "created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-12-22T12:02:20Z", "updated_at": "2024-12-26T04:19:46Z",
"pushed_at": "2024-10-08T03:16:26Z", "pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -374,7 +374,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 26, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false, "fork": false,
"created_at": "2024-07-06T00:49:40Z", "created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-12-22T20:26:26Z", "updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-07-12T00:41:36Z", "pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 114, "stargazers_count": 113,
"watchers_count": 114, "watchers_count": 113,
"has_discussions": false, "has_discussions": false,
"forks_count": 21, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 21,
"watchers": 114, "watchers": 113,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false, "fork": false,
"created_at": "2024-08-24T18:25:46Z", "created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-12-25T08:57:08Z", "updated_at": "2024-12-26T02:57:45Z",
"pushed_at": "2024-08-27T12:22:39Z", "pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 641, "stargazers_count": 642,
"watchers_count": 641, "watchers_count": 642,
"has_discussions": false, "has_discussions": false,
"forks_count": 115, "forks_count": 115,
"allow_forking": true, "allow_forking": true,
@ -277,7 +277,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 115, "forks": 115,
"watchers": 641, "watchers": 642,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-24T14:37:11Z", "updated_at": "2024-12-26T06:26:47Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 47, "stargazers_count": 46,
"watchers_count": 47, "watchers_count": 46,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -68,7 +68,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 47, "watchers": 46,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -45,10 +45,10 @@
"description": "PoC for CVE-2024-42327 \/ ZBX-25623", "description": "PoC for CVE-2024-42327 \/ ZBX-25623",
"fork": false, "fork": false,
"created_at": "2024-12-03T12:44:07Z", "created_at": "2024-12-03T12:44:07Z",
"updated_at": "2024-12-07T18:03:18Z", "updated_at": "2024-12-26T01:27:56Z",
"pushed_at": "2024-12-03T12:56:52Z", "pushed_at": "2024-12-03T12:56:52Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 16, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false, "fork": false,
"created_at": "2024-06-07T09:52:54Z", "created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-12-20T09:02:13Z", "updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-06-22T15:13:52Z", "pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 244, "stargazers_count": 243,
"watchers_count": 244, "watchers_count": 243,
"has_discussions": false, "has_discussions": false,
"forks_count": 52, "forks_count": 52,
"allow_forking": true, "allow_forking": true,
@ -181,7 +181,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 52, "forks": 52,
"watchers": 244, "watchers": 243,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -59,6 +59,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false, "fork": false,
"created_at": "2024-12-23T07:20:47Z", "created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-25T21:53:18Z", "updated_at": "2024-12-26T03:14:09Z",
"pushed_at": "2024-12-23T07:30:27Z", "pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 35, "stargazers_count": 38,
"watchers_count": 35, "watchers_count": 38,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -212,9 +212,9 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 35, "watchers": 38,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 3
}, },
{ {
"id": 907408912, "id": 907408912,
@ -262,8 +262,8 @@
"description": "CVE-2024-50379-exp", "description": "CVE-2024-50379-exp",
"fork": false, "fork": false,
"created_at": "2024-12-25T02:41:31Z", "created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-25T07:54:45Z", "updated_at": "2024-12-26T06:28:50Z",
"pushed_at": "2024-12-25T07:54:42Z", "pushed_at": "2024-12-26T06:28:46Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
@ -276,7 +276,7 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 908327097, "id": 908327097,
@ -307,7 +307,7 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 908364457, "id": 908364457,
@ -338,6 +338,6 @@
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -65,6 +65,6 @@
"forks": 4, "forks": 4,
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 2
} }
] ]

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false, "fork": false,
"created_at": "2024-12-13T17:42:55Z", "created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-25T09:09:58Z", "updated_at": "2024-12-26T01:46:25Z",
"pushed_at": "2024-12-20T10:05:15Z", "pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 71, "stargazers_count": 72,
"watchers_count": 71, "watchers_count": 72,
"has_discussions": false, "has_discussions": false,
"forks_count": 29, "forks_count": 29,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 29, "forks": 29,
"watchers": 71, "watchers": 72,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -45,10 +45,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc", "description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false, "fork": false,
"created_at": "2024-07-01T12:16:21Z", "created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-11-20T16:30:52Z", "updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-07-01T12:25:01Z", "pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 381, "stargazers_count": 380,
"watchers_count": 381, "watchers_count": 380,
"has_discussions": false, "has_discussions": false,
"forks_count": 90, "forks_count": 90,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 90, "forks": 90,
"watchers": 381, "watchers": 380,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },
@ -1159,10 +1159,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.", "description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false, "fork": false,
"created_at": "2024-07-02T14:41:43Z", "created_at": "2024-07-02T14:41:43Z",
"updated_at": "2024-12-14T03:39:21Z", "updated_at": "2024-12-26T06:26:46Z",
"pushed_at": "2024-07-02T15:16:04Z", "pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 32, "stargazers_count": 31,
"watchers_count": 32, "watchers_count": 31,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -1181,7 +1181,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 32, "watchers": 31,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.", "description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false, "fork": false,
"created_at": "2024-09-29T10:58:15Z", "created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-12-22T21:34:29Z", "updated_at": "2024-12-26T02:57:19Z",
"pushed_at": "2024-12-22T21:34:26Z", "pushed_at": "2024-12-22T21:34:26Z",
"stargazers_count": 131, "stargazers_count": 132,
"watchers_count": 131, "watchers_count": 132,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 131, "watchers": 132,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -97,6 +97,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -33199,6 +33199,7 @@
- [LucasPDiniz/CVE-2020-14882](https://github.com/LucasPDiniz/CVE-2020-14882) - [LucasPDiniz/CVE-2020-14882](https://github.com/LucasPDiniz/CVE-2020-14882)
- [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882) - [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882)
- [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC) - [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC)
- [AleksaZatezalo/CVE-2020-14882-HoaxShell](https://github.com/AleksaZatezalo/CVE-2020-14882-HoaxShell)
### CVE-2020-14883 (2020-10-21) ### CVE-2020-14883 (2020-10-21)