Auto Update 2025/01/31 12:32:45

This commit is contained in:
motikan2010-bot 2025-01-31 21:32:45 +09:00
parent 0d517540ea
commit 7a6cee5b13
22 changed files with 65 additions and 65 deletions

View file

@ -81,7 +81,7 @@
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -95,7 +95,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 55,
"score": 0,
"subscribers_count": 15

View file

@ -45,10 +45,10 @@
"description": "Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689",
"fork": false,
"created_at": "2017-05-06T15:35:42Z",
"updated_at": "2024-09-21T11:32:28Z",
"updated_at": "2025-01-31T11:21:07Z",
"pushed_at": "2024-02-15T22:50:51Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -338,8 +338,8 @@
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
"fork": false,
"created_at": "2022-05-31T15:31:37Z",
"updated_at": "2024-10-19T22:52:51Z",
"pushed_at": "2022-06-01T20:45:02Z",
"updated_at": "2025-01-31T09:32:57Z",
"pushed_at": "2025-01-31T09:32:53Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2025-01-22T23:27:57Z",
"updated_at": "2025-01-31T10:21:47Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 214,
"watchers": 215,
"score": 0,
"subscribers_count": 7
},

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-31T05:09:05Z",
"pushed_at": "2025-01-31T05:09:03Z",
"updated_at": "2025-01-31T12:02:27Z",
"pushed_at": "2025-01-31T12:02:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -107,8 +107,8 @@
"description": null,
"fork": false,
"created_at": "2025-01-30T12:06:02Z",
"updated_at": "2025-01-30T12:21:20Z",
"pushed_at": "2025-01-30T12:09:08Z",
"updated_at": "2025-01-31T10:07:21Z",
"pushed_at": "2025-01-31T10:07:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -107,8 +107,8 @@
"description": "CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8",
"fork": false,
"created_at": "2022-09-30T11:23:52Z",
"updated_at": "2024-07-05T16:18:13Z",
"pushed_at": "2024-03-16T08:25:40Z",
"updated_at": "2025-01-31T12:06:22Z",
"pushed_at": "2025-01-31T12:06:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2025-01-27T04:11:22Z",
"updated_at": "2025-01-31T08:49:49Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1178,
"watchers_count": 1178,
"stargazers_count": 1179,
"watchers_count": 1179,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1178,
"watchers": 1179,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,8 +14,8 @@
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
"fork": false,
"created_at": "2022-08-11T11:47:17Z",
"updated_at": "2024-08-21T06:25:25Z",
"pushed_at": "2022-08-23T15:57:41Z",
"updated_at": "2025-01-31T09:36:34Z",
"pushed_at": "2025-01-31T09:36:30Z",
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,

View file

@ -14,8 +14,8 @@
"description": "Pwndoc local file inclusion to remote code execution of Node.js code on the server",
"fork": false,
"created_at": "2022-12-13T10:03:14Z",
"updated_at": "2024-08-12T20:28:51Z",
"pushed_at": "2023-09-14T20:19:41Z",
"updated_at": "2025-01-31T09:58:17Z",
"pushed_at": "2025-01-31T09:58:14Z",
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,

View file

@ -110,10 +110,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2025-01-01T17:53:49Z",
"updated_at": "2025-01-31T09:35:42Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -122,7 +122,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 238,
"watchers": 237,
"score": 0,
"subscribers_count": 6
},

View file

@ -11,11 +11,11 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.",
"fork": false,
"created_at": "2024-12-04T18:42:43Z",
"updated_at": "2025-01-09T08:12:50Z",
"pushed_at": "2024-12-11T23:45:31Z",
"updated_at": "2025-01-31T08:50:22Z",
"pushed_at": "2025-01-31T08:50:18Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -620,10 +620,10 @@
"description": "This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919",
"fork": false,
"created_at": "2024-05-31T18:14:19Z",
"updated_at": "2024-12-30T22:04:33Z",
"updated_at": "2025-01-31T06:37:50Z",
"pushed_at": "2024-06-05T16:13:51Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -632,7 +632,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,8 +45,8 @@
"description": "User Enumeration through response time difference",
"fork": false,
"created_at": "2024-04-29T19:09:41Z",
"updated_at": "2024-04-29T23:58:37Z",
"pushed_at": "2024-04-29T19:12:38Z",
"updated_at": "2025-01-31T10:07:09Z",
"pushed_at": "2025-01-31T10:07:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2025-01-24T18:03:59Z",
"updated_at": "2025-01-31T10:40:46Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 263,
"watchers_count": 263,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 262,
"watchers": 263,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2025-01-23T05:37:12Z",
"updated_at": "2025-01-31T11:57:06Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 0
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-31T06:18:39Z",
"pushed_at": "2025-01-31T06:18:36Z",
"updated_at": "2025-01-31T12:02:27Z",
"pushed_at": "2025-01-31T12:02:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -85,13 +85,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-01-22T14:40:34Z",
"updated_at": "2025-01-30T11:23:09Z",
"updated_at": "2025-01-31T12:31:32Z",
"pushed_at": "2025-01-22T15:08:56Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 81,
"watchers": 83,
"score": 0,
"subscribers_count": 0
},
@ -52,8 +52,8 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-01-25T18:07:12Z",
"updated_at": "2025-01-31T06:19:18Z",
"pushed_at": "2025-01-31T06:19:15Z",
"updated_at": "2025-01-31T12:03:04Z",
"pushed_at": "2025-01-31T12:03:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Proof of concept & details for CVE-2025-21298",
"fork": false,
"created_at": "2025-01-20T18:16:51Z",
"updated_at": "2025-01-30T23:04:50Z",
"updated_at": "2025-01-31T11:32:41Z",
"pushed_at": "2025-01-20T18:22:01Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 71,
"watchers": 73,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,8 +14,8 @@
"description": "Apache CloudStack vulnerability allows unauthorized access to annotations on certain resources.",
"fork": false,
"created_at": "2025-01-30T19:26:38Z",
"updated_at": "2025-01-30T20:30:25Z",
"pushed_at": "2025-01-30T20:30:23Z",
"updated_at": "2025-01-31T11:57:09Z",
"pushed_at": "2025-01-31T11:57:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,