Auto Update 2023/11/08 06:30:55

This commit is contained in:
motikan2010-bot 2023-11-08 15:30:55 +09:00
parent c4bcd82f21
commit 863b77d2df
47 changed files with 262 additions and 442 deletions

View file

@ -444,10 +444,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2023-10-18T12:06:40Z",
"updated_at": "2023-11-08T03:21:58Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 404,
"watchers_count": 404,
"stargazers_count": 405,
"watchers_count": 405,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -456,7 +456,7 @@
"topics": [],
"visibility": "public",
"forks": 165,
"watchers": 404,
"watchers": 405,
"score": 0,
"subscribers_count": 9
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 154,
"score": 0,
"subscribers_count": 9

View file

@ -61,5 +61,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 715935878,
"name": "Nuxeo-CVE-2018-16341",
"full_name": "CN016\/Nuxeo-CVE-2018-16341",
"owner": {
"login": "CN016",
"id": 108575004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4",
"html_url": "https:\/\/github.com\/CN016"
},
"html_url": "https:\/\/github.com\/CN016\/Nuxeo-CVE-2018-16341",
"description": null,
"fork": false,
"created_at": "2023-11-08T06:08:42Z",
"updated_at": "2023-11-08T06:08:43Z",
"pushed_at": "2023-11-08T06:08:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-06T06:11:04Z",
"updated_at": "2023-11-08T03:57:06Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3913,
"watchers_count": 3913,
"stargazers_count": 3914,
"watchers_count": 3914,
"has_discussions": false,
"forks_count": 1091,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1091,
"watchers": 3913,
"watchers": 3914,
"score": 0,
"subscribers_count": 155
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 154,
"score": 0,
"subscribers_count": 9

View file

@ -73,10 +73,10 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2023-09-28T11:09:55Z",
"updated_at": "2023-11-08T02:37:20Z",
"pushed_at": "2020-10-23T19:35:42Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 107,
"watchers": 108,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2023-10-18T12:06:40Z",
"updated_at": "2023-11-08T03:21:58Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 404,
"watchers_count": 404,
"stargazers_count": 405,
"watchers_count": 405,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 165,
"watchers": 404,
"watchers": 405,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-06T06:11:04Z",
"updated_at": "2023-11-08T03:57:06Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3913,
"watchers_count": 3913,
"stargazers_count": 3914,
"watchers_count": 3914,
"has_discussions": false,
"forks_count": 1091,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1091,
"watchers": 3913,
"watchers": 3914,
"score": 0,
"subscribers_count": 155
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-11-07T07:02:09Z",
"updated_at": "2023-11-08T05:50:34Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1076,
"watchers_count": 1076,
"stargazers_count": 1077,
"watchers_count": 1077,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1076,
"watchers": 1077,
"score": 0,
"subscribers_count": 37
}

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-11-07T15:57:56Z",
"updated_at": "2023-11-08T02:22:49Z",
"pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1142,
"watchers_count": 1142,
"stargazers_count": 1143,
"watchers_count": 1143,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 1142,
"watchers": 1143,
"score": 0,
"subscribers_count": 10
}

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414051484,
"name": "cve-2021-24499",
"full_name": "hh-hunter\/cve-2021-24499",
"owner": {
"login": "hh-hunter",
"id": 91593280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
"html_url": "https:\/\/github.com\/hh-hunter"
},
"html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
"description": null,
"fork": false,
"created_at": "2021-10-06T03:07:31Z",
"updated_at": "2021-10-06T03:45:29Z",
"pushed_at": "2021-10-06T03:44:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 698068217,
"name": "CVE-2021-24499",

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-11-07T07:02:09Z",
"updated_at": "2023-11-08T05:50:34Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1076,
"watchers_count": 1076,
"stargazers_count": 1077,
"watchers_count": 1077,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1076,
"watchers": 1077,
"score": 0,
"subscribers_count": 37
},

View file

@ -58,39 +58,5 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 414009465,
"name": "CVE-2021-27651",
"full_name": "orangmuda\/CVE-2021-27651",
"owner": {
"login": "orangmuda",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/orangmuda"
},
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
"description": "bypass all stages of the password reset flow",
"fork": false,
"created_at": "2021-10-05T23:33:50Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-05T23:35:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"code-injection",
"pega",
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -685,5 +685,40 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 715920193,
"name": "CVE-2021-3560",
"full_name": "LucasPDiniz\/CVE-2021-3560",
"owner": {
"login": "LucasPDiniz",
"id": 57265360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
"html_url": "https:\/\/github.com\/LucasPDiniz"
},
"html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-3560",
"description": "Exploitation of the CVE-2021-3560 polkit vulnerability",
"fork": false,
"created_at": "2023-11-08T05:11:56Z",
"updated_at": "2023-11-08T05:17:25Z",
"pushed_at": "2023-11-08T05:15:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-3560",
"poc",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.",
"fork": false,
"created_at": "2021-11-28T13:12:38Z",
"updated_at": "2023-09-28T11:33:35Z",
"updated_at": "2023-11-08T00:30:22Z",
"pushed_at": "2021-12-05T16:54:16Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"voip-telephony-providers"
],
"visibility": "public",
"forks": 8,
"watchers": 27,
"forks": 9,
"watchers": 28,
"score": 0,
"subscribers_count": 2
}

View file

@ -523,10 +523,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2023-10-29T08:11:27Z",
"updated_at": "2023-11-08T03:21:39Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 764,
"watchers_count": 764,
"stargazers_count": 765,
"watchers_count": 765,
"has_discussions": false,
"forks_count": 172,
"allow_forking": true,
@ -542,7 +542,7 @@
],
"visibility": "public",
"forks": 172,
"watchers": 764,
"watchers": 765,
"score": 0,
"subscribers_count": 19
},

View file

@ -155,96 +155,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413943505,
"name": "CVE-2021-41773",
"full_name": "masahiro331\/CVE-2021-41773",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T18:56:04Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-06T03:43:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 413969845,
"name": "CVE-2021-41773",
"full_name": "j4k0m\/CVE-2021-41773",
"owner": {
"login": "j4k0m",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/j4k0m"
},
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T20:30:01Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T22:06:50Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 413972926,
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
"description": "Poc.py ",
"fork": false,
"created_at": "2021-10-05T20:41:34Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 414013246,
"name": "CVE-2021-41773-PoC",
@ -342,36 +252,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414050354,
"name": "CVE-2021-41773-PoC",
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
"owner": {
"login": "habibiefaried",
"id": 4345690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
"html_url": "https:\/\/github.com\/habibiefaried"
},
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"fork": false,
"created_at": "2021-10-06T03:01:41Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-06T05:39:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
@ -402,36 +282,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414082633,
"name": "cve-2021-41773-nse",
"full_name": "TAI-REx\/cve-2021-41773-nse",
"owner": {
"login": "TAI-REx",
"id": 78527947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
"html_url": "https:\/\/github.com\/TAI-REx"
},
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:36:22Z",
"updated_at": "2021-11-26T18:07:10Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",
@ -2458,10 +2308,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2023-10-31T15:29:07Z",
"updated_at": "2023-11-08T02:48:22Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -2479,7 +2329,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 935,
"watchers_count": 935,
"has_discussions": false,
"forks_count": 190,
"forks_count": 189,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"s4u2self"
],
"visibility": "public",
"forks": 190,
"forks": 189,
"watchers": 935,
"score": 0,
"subscribers_count": 25
@ -53,13 +53,13 @@
"stargazers_count": 653,
"watchers_count": 653,
"has_discussions": false,
"forks_count": 114,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 114,
"forks": 113,
"watchers": 653,
"score": 0,
"subscribers_count": 11

View file

@ -73,10 +73,10 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2023-11-03T08:20:17Z",
"updated_at": "2023-11-08T05:50:34Z",
"pushed_at": "2023-02-14T07:05:22Z",
"stargazers_count": 338,
"watchers_count": 338,
"stargazers_count": 339,
"watchers_count": 339,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 338,
"watchers": 339,
"score": 0,
"subscribers_count": 7
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-11-07T15:57:56Z",
"updated_at": "2023-11-08T02:22:49Z",
"pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1142,
"watchers_count": 1142,
"stargazers_count": 1143,
"watchers_count": 1143,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -785,9 +785,9 @@
],
"visibility": "public",
"forks": 148,
"watchers": 1142,
"watchers": 1143,
"score": 0,
"subscribers_count": 10
"subscribers_count": 11
},
{
"id": 554685669,

View file

@ -1211,10 +1211,10 @@
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
"fork": false,
"created_at": "2022-04-04T21:01:26Z",
"updated_at": "2022-11-09T18:15:41Z",
"updated_at": "2023-11-08T02:22:21Z",
"pushed_at": "2022-04-07T16:04:53Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1223,7 +1223,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 0
},

View file

@ -47,7 +47,7 @@
"forks": 181,
"watchers": 1062,
"score": 0,
"subscribers_count": 17
"subscribers_count": 18
},
{
"id": 499428815,

View file

@ -117,6 +117,6 @@
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-11-04T20:18:44Z",
"updated_at": "2023-11-08T02:27:49Z",
"pushed_at": "2023-11-05T13:34:13Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": true,
"forks_count": 19,
"allow_forking": true,
@ -28,8 +28,8 @@
],
"visibility": "public",
"forks": 19,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 6
"subscribers_count": 5
}
]

View file

@ -564,7 +564,7 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 677919510,

View file

@ -576,10 +576,10 @@
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
"fork": false,
"created_at": "2023-05-01T20:00:23Z",
"updated_at": "2023-10-20T05:10:35Z",
"updated_at": "2023-11-08T04:39:19Z",
"pushed_at": "2023-09-11T17:56:27Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -588,7 +588,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 33,
"watchers": 31,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2023-10-31T22:21:12Z",
"updated_at": "2023-11-08T04:08:36Z",
"pushed_at": "2023-10-10T16:53:48Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 112,
"watchers": 111,
"score": 0,
"subscribers_count": 8
},

View file

@ -1,62 +1,32 @@
[
{
"id": 430706849,
"name": "pxplan",
"full_name": "GREENHAT7\/pxplan",
"owner": {
"login": "GREENHAT7",
"id": 94844022,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94844022?v=4",
"html_url": "https:\/\/github.com\/GREENHAT7"
},
"html_url": "https:\/\/github.com\/GREENHAT7\/pxplan",
"description": "CVE-2023-2023",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2023-11-08T00:13:52Z",
"pushed_at": "2023-10-15T12:09:05Z",
"stargazers_count": 644,
"watchers_count": 644,
"has_discussions": false,
"forks_count": 286,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 286,
"watchers": 644,
"score": 0,
"subscribers_count": 24
},
{
"id": 677932138,
"id": 679185431,
"name": "Hvv2023",
"full_name": "GREENHAT7\/Hvv2023",
"full_name": "thatformat\/Hvv2023",
"owner": {
"login": "GREENHAT7",
"id": 94844022,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94844022?v=4",
"html_url": "https:\/\/github.com\/GREENHAT7"
"login": "thatformat",
"id": 46617017,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46617017?v=4",
"html_url": "https:\/\/github.com\/thatformat"
},
"html_url": "https:\/\/github.com\/GREENHAT7\/Hvv2023",
"html_url": "https:\/\/github.com\/thatformat\/Hvv2023",
"description": "HW2023@POC@EXP@CVE-2023-2023",
"fork": false,
"created_at": "2023-08-13T05:54:17Z",
"updated_at": "2023-11-07T01:07:52Z",
"pushed_at": "2023-09-04T02:47:29Z",
"stargazers_count": 52,
"watchers_count": 52,
"created_at": "2023-08-16T09:30:24Z",
"updated_at": "2023-11-08T02:48:39Z",
"pushed_at": "2023-08-16T08:17:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 21,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 52,
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 8,
"watchers": 19,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-16T15:57:37Z",
"updated_at": "2023-10-14T04:56:23Z",
"updated_at": "2023-11-08T03:00:49Z",
"pushed_at": "2023-07-16T16:05:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -439,5 +439,40 @@
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 715922032,
"name": "CVE-2023-22515",
"full_name": "LucasPDiniz\/CVE-2023-22515",
"owner": {
"login": "LucasPDiniz",
"id": 57265360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
"html_url": "https:\/\/github.com\/LucasPDiniz"
},
"html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2023-22515",
"description": "Server Broken Access Control in Confluence - CVE-2023-22515",
"fork": false,
"created_at": "2023-11-08T05:18:30Z",
"updated_at": "2023-11-08T05:22:02Z",
"pushed_at": "2023-11-08T05:19:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"confluence",
"cve",
"cve-2023-22515",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,7 +27,7 @@
"forks": 6,
"watchers": 23,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 639303406,

View file

@ -27,6 +27,6 @@
"forks": 4,
"watchers": 15,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-11-06T16:51:10Z",
"updated_at": "2023-11-08T06:02:37Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 220,
"watchers_count": 220,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 219,
"watchers": 220,
"score": 0,
"subscribers_count": 4
}

View file

@ -97,36 +97,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 668643357,
"name": "CVE-2023-28121",
"full_name": "Jenderal92\/CVE-2023-28121",
"owner": {
"login": "Jenderal92",
"id": 59664965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
"html_url": "https:\/\/github.com\/Jenderal92"
},
"html_url": "https:\/\/github.com\/Jenderal92\/CVE-2023-28121",
"description": "Python 2.7",
"fork": false,
"created_at": "2023-07-20T09:28:26Z",
"updated_at": "2023-07-20T09:30:47Z",
"pushed_at": "2023-07-20T09:30:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 669932793,
"name": "CVE-2023-28121",

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2023-11-07T07:25:55Z",
"updated_at": "2023-11-08T04:46:03Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 75,
"watchers": 77,
"score": 0,
"subscribers_count": 1
}

View file

@ -237,7 +237,7 @@
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 648330999,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -18,15 +18,15 @@
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 108,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2023-11-07T07:18:37Z",
"updated_at": "2023-11-08T04:35:27Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 123,
"forks": 33,
"watchers": 124,
"score": 0,
"subscribers_count": 4
},
@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2023-11-07T16:21:31Z",
"updated_at": "2023-11-08T04:36:32Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 64,
"watchers": 71,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Ivanti Sentry CVE-2023-38035",
"fork": false,
"created_at": "2023-08-23T17:34:36Z",
"updated_at": "2023-11-07T13:41:48Z",
"updated_at": "2023-11-08T02:23:02Z",
"pushed_at": "2023-08-23T18:42:37Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,9 +25,9 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 682721180,

View file

@ -907,6 +907,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1056,6 +1056,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,21 +13,21 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2023-11-07T09:19:50Z",
"updated_at": "2023-11-08T06:30:23Z",
"pushed_at": "2023-11-03T12:50:06Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 115,
"forks": 14,
"watchers": 122,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 710778413,
@ -43,10 +43,10 @@
"description": "CVE-2023-46604",
"fork": false,
"created_at": "2023-10-27T12:22:43Z",
"updated_at": "2023-11-07T09:52:45Z",
"updated_at": "2023-11-08T05:11:50Z",
"pushed_at": "2023-11-03T14:14:31Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
"fork": false,
"created_at": "2023-11-03T22:06:09Z",
"updated_at": "2023-11-07T20:01:57Z",
"updated_at": "2023-11-08T02:23:52Z",
"pushed_at": "2023-11-03T22:37:16Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -114,13 +114,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 0

View file

@ -57,7 +57,7 @@
"forks": 53,
"watchers": 349,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 700404689,
@ -73,10 +73,10 @@
"description": "CVE-2023-4911 proof of concept",
"fork": false,
"created_at": "2023-10-04T14:32:49Z",
"updated_at": "2023-11-04T17:37:14Z",
"updated_at": "2023-11-08T04:51:13Z",
"pushed_at": "2023-10-08T23:24:24Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 151,
"watchers": 152,
"score": 0,
"subscribers_count": 3
},

View file

@ -276,8 +276,7 @@
<code>The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
</code>
- [GREENHAT7/pxplan](https://github.com/GREENHAT7/pxplan)
- [GREENHAT7/Hvv2023](https://github.com/GREENHAT7/Hvv2023)
- [thatformat/Hvv2023](https://github.com/thatformat/Hvv2023)
### CVE-2023-2033 (2023-04-14)
@ -1317,6 +1316,7 @@
- [joaoviictorti/CVE-2023-22515](https://github.com/joaoviictorti/CVE-2023-22515)
- [C1ph3rX13/CVE-2023-22515](https://github.com/C1ph3rX13/CVE-2023-22515)
- [AIex-3/confluence-hack](https://github.com/AIex-3/confluence-hack)
- [LucasPDiniz/CVE-2023-22515](https://github.com/LucasPDiniz/CVE-2023-22515)
### CVE-2023-22518 (2023-10-31)
@ -2060,7 +2060,6 @@
- [gbrsh/CVE-2023-28121](https://github.com/gbrsh/CVE-2023-28121)
- [im-hanzou/Mass-CVE-2023-28121](https://github.com/im-hanzou/Mass-CVE-2023-28121)
- [rio128128/Mass-CVE-2023-28121-kdoec](https://github.com/rio128128/Mass-CVE-2023-28121-kdoec)
- [Jenderal92/CVE-2023-28121](https://github.com/Jenderal92/CVE-2023-28121)
- [C04LA/CVE-2023-28121](https://github.com/C04LA/CVE-2023-28121)
- [Jenderal92/WP-CVE-2023-28121](https://github.com/Jenderal92/WP-CVE-2023-28121)
- [1337nemojj/CVE-2023-28121](https://github.com/1337nemojj/CVE-2023-28121)
@ -12236,6 +12235,7 @@
- [asepsaepdin/CVE-2021-3560](https://github.com/asepsaepdin/CVE-2021-3560)
- [pashayogi/ROOT-CVE-2021-3560](https://github.com/pashayogi/ROOT-CVE-2021-3560)
- [TieuLong21Prosper/CVE-2021-3560](https://github.com/TieuLong21Prosper/CVE-2021-3560)
- [LucasPDiniz/CVE-2021-3560](https://github.com/LucasPDiniz/CVE-2021-3560)
### CVE-2021-3572 (2021-11-10)
@ -13291,7 +13291,6 @@
</code>
- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
### CVE-2021-24507 (2021-08-09)
@ -13889,7 +13888,6 @@
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
### CVE-2021-27850 (2021-04-15)
@ -15991,15 +15989,10 @@
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
@ -29044,6 +29037,7 @@
### CVE-2018-16341
- [mpgn/CVE-2018-16341](https://github.com/mpgn/CVE-2018-16341)
- [puckiestyle/CVE-2018-16341](https://github.com/puckiestyle/CVE-2018-16341)
- [CN016/Nuxeo-CVE-2018-16341](https://github.com/CN016/Nuxeo-CVE-2018-16341)
### CVE-2018-16370 (2018-09-02)