Auto Update 2024/01/30 06:26:00

This commit is contained in:
motikan2010-bot 2024-01-30 15:26:00 +09:00
parent 21f00fd9e7
commit 9ac0d538fa
43 changed files with 191 additions and 191 deletions

View file

@ -13,10 +13,10 @@
"description": "Test for CVE-2000-0649, and return an IP address if vulnerable",
"fork": false,
"created_at": "2021-02-11T04:29:50Z",
"updated_at": "2023-03-16T09:15:07Z",
"updated_at": "2024-01-30T01:46:19Z",
"pushed_at": "2021-02-15T23:53:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T17:31:28Z",
"updated_at": "2024-01-30T01:09:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1872,
"watchers_count": 1872,
"stargazers_count": 1873,
"watchers_count": 1873,
"has_discussions": true,
"forks_count": 341,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 341,
"watchers": 1872,
"watchers": 1873,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "Win32k LPE vulnerability used in APT attack",
"fork": false,
"created_at": "2015-05-12T18:04:48Z",
"updated_at": "2024-01-12T13:10:06Z",
"updated_at": "2024-01-30T00:26:36Z",
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 284,
"watchers_count": 284,
"has_discussions": false,
"forks_count": 191,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 191,
"watchers": 283,
"watchers": 284,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T17:31:28Z",
"updated_at": "2024-01-30T01:09:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1872,
"watchers_count": 1872,
"stargazers_count": 1873,
"watchers_count": 1873,
"has_discussions": true,
"forks_count": 341,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 341,
"watchers": 1872,
"watchers": 1873,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T17:31:28Z",
"updated_at": "2024-01-30T01:09:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1872,
"watchers_count": 1872,
"stargazers_count": 1873,
"watchers_count": 1873,
"has_discussions": true,
"forks_count": 341,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 341,
"watchers": 1872,
"watchers": 1873,
"score": 0,
"subscribers_count": 35
},

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-01-29T17:37:53Z",
"updated_at": "2024-01-30T03:22:16Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 6
},

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T17:31:28Z",
"updated_at": "2024-01-30T01:09:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1872,
"watchers_count": 1872,
"stargazers_count": 1873,
"watchers_count": 1873,
"has_discussions": true,
"forks_count": 341,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 341,
"watchers": 1872,
"watchers": 1873,
"score": 0,
"subscribers_count": 35
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T17:31:28Z",
"updated_at": "2024-01-30T01:09:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1872,
"watchers_count": 1872,
"stargazers_count": 1873,
"watchers_count": 1873,
"has_discussions": true,
"forks_count": 341,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 341,
"watchers": 1872,
"watchers": 1873,
"score": 0,
"subscribers_count": 35
}

View file

@ -440,10 +440,10 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2024-01-27T05:10:00Z",
"updated_at": "2024-01-30T00:32:07Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -452,7 +452,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T17:31:28Z",
"updated_at": "2024-01-30T01:09:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1872,
"watchers_count": 1872,
"stargazers_count": 1873,
"watchers_count": 1873,
"has_discussions": true,
"forks_count": 341,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 341,
"watchers": 1872,
"watchers": 1873,
"score": 0,
"subscribers_count": 35
},
@ -159,13 +159,13 @@
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 27,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 26,
"watchers": 87,
"score": 0,
"subscribers_count": 4

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-01-29T17:31:45Z",
"updated_at": "2024-01-30T02:26:34Z",
"pushed_at": "2023-12-06T15:30:56Z",
"stargazers_count": 1199,
"watchers_count": 1199,
"stargazers_count": 1200,
"watchers_count": 1200,
"has_discussions": false,
"forks_count": 154,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 154,
"watchers": 1199,
"watchers": 1200,
"score": 0,
"subscribers_count": 12
}

View file

@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2024-01-29T11:15:33Z",
"updated_at": "2024-01-30T03:52:20Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 904,
"watchers_count": 904,
"stargazers_count": 905,
"watchers_count": 905,
"has_discussions": false,
"forks_count": 243,
"allow_forking": true,
@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 243,
"watchers": 904,
"watchers": 905,
"score": 0,
"subscribers_count": 27
},

View file

@ -386,7 +386,7 @@
"description": null,
"fork": false,
"created_at": "2021-07-09T08:27:36Z",
"updated_at": "2022-06-25T14:18:01Z",
"updated_at": "2024-01-30T02:03:36Z",
"pushed_at": "2021-07-11T00:23:19Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -169,10 +169,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2024-01-26T15:15:38Z",
"updated_at": "2024-01-30T04:01:44Z",
"pushed_at": "2023-05-04T19:24:39Z",
"stargazers_count": 1003,
"watchers_count": 1003,
"stargazers_count": 1004,
"watchers_count": 1004,
"has_discussions": false,
"forks_count": 315,
"allow_forking": true,
@ -185,7 +185,7 @@
],
"visibility": "public",
"forks": 315,
"watchers": 1003,
"watchers": 1004,
"score": 0,
"subscribers_count": 16
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-01-26T17:09:50Z",
"updated_at": "2024-01-30T04:29:21Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1510,
"watchers_count": 1510,
"stargazers_count": 1511,
"watchers_count": 1511,
"has_discussions": false,
"forks_count": 492,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 492,
"watchers": 1510,
"watchers": 1511,
"score": 0,
"subscribers_count": 28
},

View file

@ -103,19 +103,19 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2024-01-26T09:40:54Z",
"updated_at": "2024-01-30T04:59:23Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 126,
"forks_count": 127,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 126,
"watchers": 450,
"forks": 127,
"watchers": 451,
"score": 0,
"subscribers_count": 8
},
@ -907,12 +907,12 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-01-29T19:07:28Z",
"updated_at": "2024-01-30T05:01:14Z",
"pushed_at": "2023-11-08T21:02:16Z",
"stargazers_count": 1683,
"watchers_count": 1683,
"stargazers_count": 1684,
"watchers_count": 1684,
"has_discussions": false,
"forks_count": 498,
"forks_count": 499,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,8 +923,8 @@
"security"
],
"visibility": "public",
"forks": 498,
"watchers": 1683,
"forks": 499,
"watchers": 1684,
"score": 0,
"subscribers_count": 27
},
@ -3576,19 +3576,19 @@
"description": "This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-13T02:18:57Z",
"updated_at": "2023-11-18T03:11:05Z",
"updated_at": "2024-01-30T05:00:44Z",
"pushed_at": "2021-12-13T16:35:58Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 19,
"forks": 3,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},
@ -10669,10 +10669,10 @@
"description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
"fork": false,
"created_at": "2022-01-09T13:38:38Z",
"updated_at": "2024-01-29T12:00:00Z",
"updated_at": "2024-01-30T05:00:29Z",
"pushed_at": "2022-01-09T13:43:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -10681,7 +10681,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 12,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 11,
"watchers": 53,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-01-25T12:08:15Z",
"updated_at": "2024-01-30T02:19:08Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 739,
"watchers_count": 739,
"stargazers_count": 740,
"watchers_count": 740,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 158,
"watchers": 739,
"watchers": 740,
"score": 0,
"subscribers_count": 16
}

View file

@ -796,10 +796,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-01-29T17:31:45Z",
"updated_at": "2024-01-30T02:26:34Z",
"pushed_at": "2023-12-06T15:30:56Z",
"stargazers_count": 1199,
"watchers_count": 1199,
"stargazers_count": 1200,
"watchers_count": 1200,
"has_discussions": false,
"forks_count": 154,
"allow_forking": true,
@ -815,7 +815,7 @@
],
"visibility": "public",
"forks": 154,
"watchers": 1199,
"watchers": 1200,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-01-24T13:50:51Z",
"updated_at": "2024-01-30T06:22:18Z",
"pushed_at": "2024-01-25T06:03:11Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": true,
"forks_count": 21,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 149,
"watchers": 150,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "Root Cause Analysis of CVE-2022-4262.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2023-12-03T18:16:52Z",
"updated_at": "2024-01-30T02:29:21Z",
"pushed_at": "2024-01-29T16:24:16Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 2
},
@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-24T11:58:54Z",
"updated_at": "2024-01-29T17:15:46Z",
"updated_at": "2024-01-30T02:24:39Z",
"pushed_at": "2024-01-29T22:03:03Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 2
}

View file

@ -1274,7 +1274,7 @@
"fork": false,
"created_at": "2023-04-21T08:15:19Z",
"updated_at": "2023-05-05T13:36:18Z",
"pushed_at": "2024-01-28T04:55:55Z",
"pushed_at": "2024-01-30T05:07:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad",
"fork": false,
"created_at": "2023-01-09T11:44:09Z",
"updated_at": "2023-11-20T11:52:23Z",
"updated_at": "2024-01-30T04:37:38Z",
"pushed_at": "2023-01-14T04:40:47Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "Unauthenticated Remote Code Execution in PyLoad <0.5.0b3.dev31",
"fork": false,
"created_at": "2023-05-21T17:09:05Z",
"updated_at": "2023-11-20T11:53:49Z",
"updated_at": "2024-01-30T05:02:22Z",
"pushed_at": "2023-05-21T17:15:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
"updated_at": "2024-01-28T01:33:41Z",
"updated_at": "2024-01-30T02:44:40Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 0
},

View file

@ -193,10 +193,10 @@
"description": "A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center. ",
"fork": false,
"created_at": "2024-01-23T02:17:36Z",
"updated_at": "2024-01-25T09:27:01Z",
"updated_at": "2024-01-30T01:27:26Z",
"pushed_at": "2024-01-23T12:03:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-01-23T16:02:48Z",
"updated_at": "2024-01-30T05:06:53Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 237,
"watchers": 238,
"score": 0,
"subscribers_count": 4
},

View file

@ -133,10 +133,10 @@
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
"fork": false,
"created_at": "2024-01-22T10:38:02Z",
"updated_at": "2024-01-29T15:38:07Z",
"updated_at": "2024-01-30T06:07:47Z",
"pushed_at": "2024-01-24T13:45:56Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 28,
"watchers": 30,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
"fork": false,
"created_at": "2023-09-01T07:41:23Z",
"updated_at": "2024-01-03T14:04:40Z",
"updated_at": "2024-01-30T03:48:47Z",
"pushed_at": "2023-11-12T00:42:29Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 146,
"watchers": 147,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,20 +13,20 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-01-29T17:08:05Z",
"updated_at": "2024-01-29T17:46:27Z",
"pushed_at": "2024-01-29T17:46:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-01-30T04:46:19Z",
"pushed_at": "2024-01-30T05:58:08Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 50,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 49,
"watchers": 143,
"score": 0,
"subscribers_count": 4

View file

@ -292,6 +292,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Public disclosure of Ivanti's Avalanche Path Traversal vulnerability",
"fork": false,
"created_at": "2024-01-08T08:21:39Z",
"updated_at": "2024-01-11T01:25:34Z",
"updated_at": "2024-01-30T03:15:05Z",
"pushed_at": "2024-01-08T08:46:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -91,6 +91,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-01-28T23:21:07Z",
"updated_at": "2024-01-30T00:44:53Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 2
}

View file

@ -108,13 +108,13 @@
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 82,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-01-29T05:32:07Z",
"updated_at": "2024-01-30T02:34:04Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 272,
"watchers": 273,
"score": 0,
"subscribers_count": 13
},

View file

@ -283,10 +283,10 @@
"description": "CVE-2023-51385 PoC Exploit ",
"fork": false,
"created_at": "2024-01-02T02:12:35Z",
"updated_at": "2024-01-26T07:04:40Z",
"updated_at": "2024-01-30T01:43:22Z",
"pushed_at": "2024-01-02T06:48:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 16,
"score": 0,
"subscribers_count": 1

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Analysis of the vulnerability",
"fork": false,
"created_at": "2024-01-17T04:35:42Z",
"updated_at": "2024-01-27T15:24:41Z",
"updated_at": "2024-01-30T02:51:47Z",
"pushed_at": "2024-01-23T16:30:55Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2024-21305. ",
"fork": false,
"created_at": "2023-12-16T23:27:34Z",
"updated_at": "2024-01-26T08:31:08Z",
"updated_at": "2024-01-30T05:44:10Z",
"pushed_at": "2024-01-14T17:21:42Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
}

View file

@ -103,10 +103,10 @@
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
"updated_at": "2024-01-29T19:07:46Z",
"updated_at": "2024-01-30T03:47:06Z",
"pushed_at": "2024-01-17T00:38:28Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,19 +73,19 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-01-30T00:15:40Z",
"updated_at": "2024-01-30T06:12:49Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 79,
"forks": 15,
"watchers": 85,
"score": 0,
"subscribers_count": 2
},
@ -256,12 +256,12 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-01-29T17:27:00Z",
"updated_at": "2024-01-30T04:26:41Z",
"pushed_at": "2024-01-28T15:02:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -271,8 +271,8 @@
"jenkins"
],
"visibility": "public",
"forks": 2,
"watchers": 8,
"forks": 3,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
@ -364,7 +364,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 749788968,
@ -394,6 +394,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]