Auto Update 2023/05/13 12:28:37

This commit is contained in:
motikan2010-bot 2023-05-13 21:28:37 +09:00
parent cf606aaa59
commit 6e34c9956d
17 changed files with 68 additions and 68 deletions

View file

@ -71,7 +71,7 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2023-05-12T17:05:06Z",
"updated_at": "2023-05-13T10:33:01Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 109,
"watchers_count": 109,

View file

@ -42,10 +42,10 @@
"description": "CVE-2018-19320 LPE Exploit",
"fork": false,
"created_at": "2021-08-19T16:43:52Z",
"updated_at": "2023-02-27T19:10:49Z",
"updated_at": "2023-05-13T10:01:39Z",
"pushed_at": "2021-08-19T16:54:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2023-05-10T14:16:15Z",
"updated_at": "2023-05-13T10:02:02Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2023-05-04T15:29:23Z",
"updated_at": "2023-05-13T09:44:56Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 633,
"watchers_count": 633,
"stargazers_count": 635,
"watchers_count": 635,
"has_discussions": false,
"forks_count": 159,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 159,
"watchers": 633,
"watchers": 635,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false,
"created_at": "2020-07-21T08:01:20Z",
"updated_at": "2023-04-23T11:24:16Z",
"updated_at": "2023-05-13T11:31:58Z",
"pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 152,
"watchers": 153,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-05-12T09:32:07Z",
"updated_at": "2023-05-13T10:31:28Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1688,
"watchers_count": 1688,
"stargazers_count": 1689,
"watchers_count": 1689,
"has_discussions": false,
"forks_count": 588,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 588,
"watchers": 1688,
"watchers": 1689,
"score": 0
},
{

View file

@ -778,12 +778,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-05-13T04:11:49Z",
"updated_at": "2023-05-13T07:34:06Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 909,
"watchers_count": 909,
"stargazers_count": 910,
"watchers_count": 910,
"has_discussions": false,
"forks_count": 114,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -796,8 +796,8 @@
"vcenter"
],
"visibility": "public",
"forks": 114,
"watchers": 909,
"forks": 115,
"watchers": 910,
"score": 0
}
]

View file

@ -249,10 +249,10 @@
"description": "PoC for CVE-2021-3129 (Laravel)",
"fork": false,
"created_at": "2021-10-01T09:09:38Z",
"updated_at": "2022-09-03T22:05:43Z",
"updated_at": "2023-05-13T07:46:29Z",
"pushed_at": "2021-10-09T09:37:05Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -261,7 +261,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -1943,7 +1943,7 @@
"fork": false,
"created_at": "2023-05-13T01:02:32Z",
"updated_at": "2023-05-13T02:20:36Z",
"pushed_at": "2023-05-13T06:12:17Z",
"pushed_at": "2023-05-13T07:48:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -4180,10 +4180,10 @@
"description": "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.",
"fork": false,
"created_at": "2021-12-13T11:34:54Z",
"updated_at": "2023-01-30T21:58:00Z",
"updated_at": "2023-05-13T12:05:27Z",
"pushed_at": "2022-01-13T14:36:04Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -4197,7 +4197,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -9532,12 +9532,12 @@
"description": "Ansible playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 for Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-23T13:24:41Z",
"updated_at": "2022-07-23T17:39:47Z",
"updated_at": "2023-05-13T06:51:06Z",
"pushed_at": "2022-01-10T22:21:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -9549,8 +9549,8 @@
"security"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -1175,7 +1175,7 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-05-09T11:02:01Z",
"updated_at": "2023-05-13T08:27:35Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 397,
"watchers_count": 397,

View file

@ -709,12 +709,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-05-13T04:11:49Z",
"updated_at": "2023-05-13T07:34:06Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 909,
"watchers_count": 909,
"stargazers_count": 910,
"watchers_count": 910,
"has_discussions": false,
"forks_count": 114,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -727,8 +727,8 @@
"vcenter"
],
"visibility": "public",
"forks": 114,
"watchers": 909,
"forks": 115,
"watchers": 910,
"score": 0
},
{

View file

@ -304,10 +304,10 @@
"description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.",
"fork": false,
"created_at": "2022-03-31T15:01:12Z",
"updated_at": "2023-02-23T15:42:41Z",
"updated_at": "2023-05-13T11:01:35Z",
"pushed_at": "2022-04-06T15:00:14Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -316,7 +316,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -221,7 +221,7 @@
"fork": false,
"created_at": "2023-05-02T08:48:35Z",
"updated_at": "2023-05-11T05:31:02Z",
"pushed_at": "2023-05-08T16:52:44Z",
"pushed_at": "2023-05-13T12:25:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2023-05-13T00:37:52Z",
"updated_at": "2023-05-13T08:58:03Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 432,
"watchers_count": 432,
"stargazers_count": 433,
"watchers_count": 433,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 432,
"watchers": 433,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 56,
"score": 0
}

View file

@ -42,10 +42,10 @@
"description": "CVE-2023-0386在ubuntu22.04上的提权",
"fork": false,
"created_at": "2023-05-05T03:02:13Z",
"updated_at": "2023-05-13T02:34:11Z",
"updated_at": "2023-05-13T11:39:31Z",
"pushed_at": "2023-05-08T07:19:34Z",
"stargazers_count": 273,
"watchers_count": 273,
"stargazers_count": 274,
"watchers_count": 274,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 273,
"watchers": 274,
"score": 0
},
{