Auto Update 2023/11/19 06:25:21

This commit is contained in:
motikan2010-bot 2023-11-19 15:25:21 +09:00
parent 3d508f3113
commit 6c69d711df
55 changed files with 215 additions and 150 deletions

View file

@ -18,7 +18,7 @@
"stargazers_count": 375,
"watchers_count": 375,
"has_discussions": false,
"forks_count": 119,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"cve-2008-0166"
],
"visibility": "public",
"forks": 119,
"forks": 118,
"watchers": 375,
"score": 0,
"subscribers_count": 17

View file

@ -13,10 +13,10 @@
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
"fork": false,
"created_at": "2021-05-17T04:39:32Z",
"updated_at": "2023-10-14T00:54:03Z",
"updated_at": "2023-11-19T05:03:50Z",
"pushed_at": "2023-09-05T12:25:25Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 4
}

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-11-17T13:42:23Z",
"updated_at": "2023-11-19T05:40:21Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 4
},

View file

@ -59,6 +59,39 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 321044044,
"name": "CVE-2020-17530",
"full_name": "Al1ex\/CVE-2020-17530",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-17530",
"description": "S2-061 CVE-2020-17530",
"fork": false,
"created_at": "2020-12-13T11:02:15Z",
"updated_at": "2023-09-28T11:22:57Z",
"pushed_at": "2020-12-22T15:27:51Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-17530",
"s2-061"
],
"visibility": "public",
"forks": 10,
"watchers": 30,
"score": 0,
"subscribers_count": 2
},
{
"id": 321259848,
"name": "CVE-2020-17530-strust2-061",

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-11-17T13:42:23Z",
"updated_at": "2023-11-19T05:40:21Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 4
}

View file

@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 320394850,
"name": "git-lfs-RCE-exploit-CVE-2020-27955-revshell",
"full_name": "williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell",
"owner": {
"login": "williamgoulois",
"id": 37271970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37271970?v=4",
"html_url": "https:\/\/github.com\/williamgoulois"
},
"html_url": "https:\/\/github.com\/williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell",
"description": null,
"fork": false,
"created_at": "2020-12-10T21:31:24Z",
"updated_at": "2021-02-11T07:12:46Z",
"pushed_at": "2020-12-10T22:03:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 322199299,
"name": "CVE-2020-27955",

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-11-17T06:38:11Z",
"updated_at": "2023-11-19T00:32:10Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1755,
"watchers_count": 1755,
"stargazers_count": 1756,
"watchers_count": 1756,
"has_discussions": false,
"forks_count": 585,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 585,
"watchers": 1755,
"watchers": 1756,
"score": 0,
"subscribers_count": 44
},

View file

@ -13,10 +13,10 @@
"description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.",
"fork": false,
"created_at": "2023-11-04T11:45:55Z",
"updated_at": "2023-11-11T03:08:16Z",
"updated_at": "2023-11-19T02:23:29Z",
"pushed_at": "2023-11-04T19:17:16Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
}

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-11-18T07:39:50Z",
"updated_at": "2023-11-19T02:50:05Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 657,
"watchers_count": 657,
"stargazers_count": 658,
"watchers_count": 658,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 657,
"watchers": 658,
"score": 0,
"subscribers_count": 12
},

View file

@ -2577,10 +2577,10 @@
"description": "An eBPF program to detect attacks on CVE-2022-0847",
"fork": false,
"created_at": "2023-07-06T01:31:01Z",
"updated_at": "2023-11-07T15:05:02Z",
"updated_at": "2023-11-19T02:28:51Z",
"pushed_at": "2023-11-04T15:49:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2589,7 +2589,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -57,7 +57,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 720410510,
@ -87,6 +87,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1524,10 +1524,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-23T06:38:46Z",
"updated_at": "2023-07-12T08:41:24Z",
"updated_at": "2023-11-19T00:48:58Z",
"pushed_at": "2022-08-23T06:40:24Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1536,7 +1536,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -2432,6 +2432,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-27T08:58:11Z",
"updated_at": "2023-11-04T16:57:00Z",
"updated_at": "2023-11-19T01:44:47Z",
"pushed_at": "2023-10-27T09:00:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -242,6 +242,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -400,7 +400,7 @@
"forks": 8,
"watchers": 39,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 708903459,
@ -520,7 +520,7 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 710019547,

View file

@ -27,7 +27,7 @@
"forks": 10,
"watchers": 52,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 681042384,

View file

@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 720351156,
@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -482,7 +482,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 716585912,

View file

@ -90,10 +90,10 @@
"description": "An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization",
"fork": false,
"created_at": "2023-11-05T06:45:33Z",
"updated_at": "2023-11-14T05:13:15Z",
"updated_at": "2023-11-19T02:28:03Z",
"pushed_at": "2023-11-05T07:08:41Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -102,7 +102,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2023-11-19T00:14:52Z",
"updated_at": "2023-11-19T06:02:14Z",
"pushed_at": "2023-11-18T22:54:27Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"forks": 1,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -64,7 +64,7 @@
"forks": 5,
"watchers": 37,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 703043275,

View file

@ -29,6 +29,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -117,6 +117,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -33,6 +33,6 @@
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -57,7 +57,7 @@
"forks": 15,
"watchers": 88,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 717453961,

View file

@ -333,6 +333,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-33733 reportlab RCE",
"fork": false,
"created_at": "2023-05-30T22:22:50Z",
"updated_at": "2023-10-26T14:44:18Z",
"updated_at": "2023-11-19T03:15:32Z",
"pushed_at": "2023-09-05T15:49:14Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 82,
"watchers": 83,
"score": 0,
"subscribers_count": 2
}

View file

@ -27,7 +27,7 @@
"forks": 28,
"watchers": 86,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 686263823,

View file

@ -27,6 +27,6 @@
"forks": 10,
"watchers": 58,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -13,10 +13,10 @@
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
"fork": false,
"created_at": "2023-09-01T20:16:28Z",
"updated_at": "2023-10-17T15:26:17Z",
"updated_at": "2023-11-19T00:38:19Z",
"pushed_at": "2023-09-12T07:52:40Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 2
}

View file

@ -27,6 +27,6 @@
"forks": 10,
"watchers": 50,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -27,6 +27,6 @@
"forks": 11,
"watchers": 60,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,7 +27,7 @@
"forks": 37,
"watchers": 130,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 707448488,
@ -103,19 +103,19 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2023-11-18T07:40:49Z",
"updated_at": "2023-11-19T04:39:37Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 76,
"forks": 19,
"watchers": 78,
"score": 0,
"subscribers_count": 2
}

View file

@ -87,7 +87,7 @@
"forks": 44,
"watchers": 208,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 682770739,
@ -117,6 +117,6 @@
"forks": 26,
"watchers": 159,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -27,7 +27,7 @@
"forks": 8,
"watchers": 25,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 682721180,

View file

@ -63,6 +63,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -61,7 +61,7 @@
"forks": 128,
"watchers": 705,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
},
{
"id": 683645489,

View file

@ -27,6 +27,6 @@
"forks": 6,
"watchers": 14,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,6 +29,6 @@
"forks": 9,
"watchers": 53,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -13,19 +13,19 @@
"description": "Chrome XXE 漏洞 POC实现对访客者本地文件读取",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2023-11-18T15:59:27Z",
"updated_at": "2023-11-19T05:22:35Z",
"pushed_at": "2023-11-18T20:17:12Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"forks": 4,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-04T21:14:09Z",
"updated_at": "2023-11-09T09:12:52Z",
"updated_at": "2023-11-19T02:24:20Z",
"pushed_at": "2023-11-04T21:22:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "BoltWire v6.03 vulnerable to \"Improper Access Control\"",
"fork": false,
"created_at": "2023-10-31T12:40:14Z",
"updated_at": "2023-11-17T15:01:01Z",
"updated_at": "2023-11-19T02:14:00Z",
"pushed_at": "2023-10-31T12:41:20Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2023-11-18T23:11:31Z",
"updated_at": "2023-11-19T02:16:42Z",
"pushed_at": "2023-11-17T08:40:55Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 152,
"watchers": 153,
"score": 0,
"subscribers_count": 3
},
@ -43,10 +43,10 @@
"description": "CVE-2023-46604",
"fork": false,
"created_at": "2023-10-27T12:22:43Z",
"updated_at": "2023-11-18T13:56:09Z",
"updated_at": "2023-11-19T04:41:02Z",
"pushed_at": "2023-11-03T14:14:31Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 25,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
"fork": false,
"created_at": "2023-11-03T22:06:09Z",
"updated_at": "2023-11-18T23:16:19Z",
"updated_at": "2023-11-19T02:28:15Z",
"pushed_at": "2023-11-03T22:37:16Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 2
},
@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-04T11:58:21Z",
"updated_at": "2023-11-17T16:39:33Z",
"updated_at": "2023-11-19T00:38:49Z",
"pushed_at": "2023-11-06T07:26:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -329,6 +329,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2023-11-18T19:41:04Z",
"updated_at": "2023-11-19T02:19:16Z",
"pushed_at": "2023-11-10T02:12:38Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -61,9 +61,9 @@
],
"visibility": "public",
"forks": 26,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 712913642,
@ -169,10 +169,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-02T16:03:35Z",
"updated_at": "2023-11-11T15:18:36Z",
"updated_at": "2023-11-19T02:28:43Z",
"pushed_at": "2023-11-02T16:10:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,12 +13,12 @@
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
"fork": false,
"created_at": "2023-11-17T07:03:06Z",
"updated_at": "2023-11-18T19:32:11Z",
"updated_at": "2023-11-19T05:02:25Z",
"pushed_at": "2023-11-17T07:19:11Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"sysaid"
],
"visibility": "public",
"forks": 3,
"watchers": 18,
"forks": 4,
"watchers": 20,
"score": 0,
"subscribers_count": 1
}

View file

@ -197,7 +197,7 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 711157442,

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Image horizontal reel scroll slideshow <= 13.2 - Authenticated (Subscriber+) SQL Injection via Shortcode",
"fork": false,
"created_at": "2023-10-31T09:26:21Z",
"updated_at": "2023-11-12T22:18:23Z",
"updated_at": "2023-11-19T02:13:02Z",
"pushed_at": "2023-10-31T09:32:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
"fork": false,
"created_at": "2023-11-15T14:53:03Z",
"updated_at": "2023-11-18T22:58:32Z",
"updated_at": "2023-11-19T02:15:27Z",
"pushed_at": "2023-11-15T14:53:48Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -21959,6 +21959,7 @@
- [ka1n4t/CVE-2020-17530](https://github.com/ka1n4t/CVE-2020-17530)
- [wuzuowei/CVE-2020-17530](https://github.com/wuzuowei/CVE-2020-17530)
- [Al1ex/CVE-2020-17530](https://github.com/Al1ex/CVE-2020-17530)
- [fengziHK/CVE-2020-17530-strust2-061](https://github.com/fengziHK/CVE-2020-17530-strust2-061)
- [ludy-dev/freemarker_RCE_struts2_s2-061](https://github.com/ludy-dev/freemarker_RCE_struts2_s2-061)
- [CyborgSecurity/CVE-2020-17530](https://github.com/CyborgSecurity/CVE-2020-17530)
@ -22772,6 +22773,7 @@
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go)
- [yhsung/cve-2020-27955-poc](https://github.com/yhsung/cve-2020-27955-poc)
- [r00t4dm/CVE-2020-27955](https://github.com/r00t4dm/CVE-2020-27955)
- [williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell](https://github.com/williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell)
- [shubham0d/CVE-2020-27955](https://github.com/shubham0d/CVE-2020-27955)
- [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955)
- [NeoDarwin/CVE-2020-27955](https://github.com/NeoDarwin/CVE-2020-27955)