Auto Update 2022/08/17 06:17:14

This commit is contained in:
motikan2010-bot 2022-08-17 15:17:14 +09:00
parent 97ff946a19
commit 9c59c83188
38 changed files with 172 additions and 172 deletions

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2022-08-11T14:34:45Z",
"updated_at": "2022-08-17T01:25:39Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 343,
"watchers_count": 343,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 108,
"watchers": 342,
"watchers": 343,
"score": 0
},
{

View file

@ -74,10 +74,10 @@
"description": "CVE-2017-0785 BlueBorne PoC",
"fork": false,
"created_at": "2017-09-22T22:03:40Z",
"updated_at": "2022-08-05T07:06:13Z",
"updated_at": "2022-08-17T01:19:18Z",
"pushed_at": "2017-09-22T22:23:52Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -672,13 +672,13 @@
"pushed_at": "2019-04-25T12:44:02Z",
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 53,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 53,
"forks": 54,
"watchers": 117,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2022-07-27T07:07:46Z",
"updated_at": "2022-08-17T05:15:29Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 81,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 191,
"forks": 82,
"watchers": 192,
"score": 0
},
{

View file

@ -1770,13 +1770,13 @@
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1113,
"watchers_count": 1113,
"forks_count": 356,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 356,
"forks": 355,
"watchers": 1113,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2022-08-02T19:52:38Z",
"updated_at": "2022-08-17T05:58:09Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 142,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 142,
"watchers": 354,
"watchers": 355,
"score": 0
},
{

View file

@ -41,11 +41,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-16T09:41:49Z",
"updated_at": "2022-08-17T03:26:00Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3485,
"watchers_count": 3485,
"forks_count": 1028,
"stargazers_count": 3487,
"watchers_count": 3487,
"forks_count": 1029,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -71,8 +71,8 @@
"webshell"
],
"visibility": "public",
"forks": 1028,
"watchers": 3485,
"forks": 1029,
"watchers": 3487,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2022-08-16T12:14:17Z",
"updated_at": "2022-08-17T01:06:32Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 824,
"watchers_count": 824,
"stargazers_count": 825,
"watchers_count": 825,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 824,
"watchers": 825,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Little thing put together quickly to demonstrate this CVE ",
"fork": false,
"created_at": "2021-10-16T01:10:33Z",
"updated_at": "2022-08-15T19:14:39Z",
"updated_at": "2022-08-17T02:18:26Z",
"pushed_at": "2021-10-19T10:50:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -62,7 +62,7 @@
"pushed_at": "2021-06-10T02:46:52Z",
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 78,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -71,7 +71,7 @@
"sigred"
],
"visibility": "public",
"forks": 78,
"forks": 77,
"watchers": 272,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-16T09:41:49Z",
"updated_at": "2022-08-17T03:26:00Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3485,
"watchers_count": 3485,
"forks_count": 1028,
"stargazers_count": 3487,
"watchers_count": 3487,
"forks_count": 1029,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"webshell"
],
"visibility": "public",
"forks": 1028,
"watchers": 3485,
"forks": 1029,
"watchers": 3487,
"score": 0
},
{
@ -369,10 +369,10 @@
"description": "CVE-2020-14882\/14883\/14750",
"fork": false,
"created_at": "2020-11-04T03:09:13Z",
"updated_at": "2022-04-28T08:45:52Z",
"updated_at": "2022-08-17T04:51:16Z",
"pushed_at": "2020-11-04T03:15:33Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -380,7 +380,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -42,7 +42,7 @@
"fork": false,
"created_at": "2022-05-18T02:02:51Z",
"updated_at": "2022-08-15T13:19:09Z",
"pushed_at": "2022-08-15T13:32:39Z",
"pushed_at": "2022-08-17T05:12:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -45,13 +45,13 @@
"pushed_at": "2021-04-22T02:06:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -134,10 +134,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-08-04T07:51:51Z",
"updated_at": "2022-08-17T04:28:02Z",
"pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 69,
"watchers": 68,
"score": 0
},
{

View file

@ -1137,10 +1137,10 @@
"description": null,
"fork": false,
"created_at": "2022-01-26T16:43:18Z",
"updated_at": "2022-08-05T06:38:42Z",
"updated_at": "2022-08-17T03:46:32Z",
"pushed_at": "2022-01-26T16:51:02Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -1148,7 +1148,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1435,
"watchers_count": 1435,
"forks_count": 477,
"forks_count": 478,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 477,
"forks": 478,
"watchers": 1435,
"score": 0
},

View file

@ -41,10 +41,10 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2022-08-05T18:32:10Z",
"updated_at": "2022-08-17T01:16:25Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 44,
"watchers": 45,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2022-07-30T20:35:48Z",
"updated_at": "2022-08-17T04:57:04Z",
"pushed_at": "2022-03-10T14:02:09Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-14T12:01:31Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 5,
"score": 0
}

View file

@ -517,10 +517,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-08-15T16:41:17Z",
"updated_at": "2022-08-17T04:57:18Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1445,
"watchers_count": 1445,
"stargazers_count": 1446,
"watchers_count": 1446,
"forks_count": 403,
"allow_forking": true,
"is_template": false,
@ -533,7 +533,7 @@
],
"visibility": "public",
"forks": 403,
"watchers": 1445,
"watchers": 1446,
"score": 0
},
{
@ -647,10 +647,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-08-16T04:45:39Z",
"updated_at": "2022-08-17T04:36:39Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 487,
"watchers_count": 487,
"stargazers_count": 488,
"watchers_count": 488,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
@ -663,7 +663,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 487,
"watchers": 488,
"score": 0
},
{
@ -1119,10 +1119,10 @@
"description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228",
"fork": false,
"created_at": "2021-12-12T04:23:10Z",
"updated_at": "2022-08-11T16:26:49Z",
"updated_at": "2022-08-17T05:28:16Z",
"pushed_at": "2021-12-15T12:17:19Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -1130,7 +1130,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-29T07:32:30Z",
"updated_at": "2022-07-25T03:49:09Z",
"updated_at": "2022-08-17T05:01:06Z",
"pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
@ -195,7 +195,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 71,
"watchers": 72,
"score": 0
},
{

View file

@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-08-16T07:41:44Z",
"updated_at": "2022-08-17T03:06:37Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 295,
"watchers_count": 295,
"stargazers_count": 296,
"watchers_count": 296,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
@ -1146,7 +1146,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 295,
"watchers": 296,
"score": 0
},
{

View file

@ -321,10 +321,10 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2022-08-15T15:42:24Z",
"updated_at": "2022-08-17T05:00:35Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@ -332,7 +332,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 214,
"watchers": 215,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-12T14:34:48Z",
"updated_at": "2022-07-28T10:14:20Z",
"updated_at": "2022-08-17T05:42:45Z",
"pushed_at": "2022-08-10T04:52:16Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2022-08-16T14:47:39Z",
"updated_at": "2022-08-17T03:56:10Z",
"pushed_at": "2022-08-03T08:39:29Z",
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 137,
"stargazers_count": 320,
"watchers_count": 320,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 137,
"watchers": 317,
"forks": 140,
"watchers": 320,
"score": 0
}
]

View file

@ -149,7 +149,7 @@
"pushed_at": "2022-05-03T10:40:31Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -162,7 +162,7 @@
"rce"
],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 67,
"score": 0
},

View file

@ -80,7 +80,7 @@
"pushed_at": "2022-05-22T13:21:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -93,7 +93,7 @@
"rtf"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-24T20:19:55Z",
"updated_at": "2022-08-10T23:44:21Z",
"updated_at": "2022-08-17T05:01:11Z",
"pushed_at": "2022-05-26T16:07:18Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 134,
"watchers": 135,
"score": 0
},
{

View file

@ -47,10 +47,10 @@
"description": "CVE-2022-24500 Windows SMB Unauthenticated Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-08-15T07:52:50Z",
"updated_at": "2022-08-15T07:53:37Z",
"updated_at": "2022-08-17T03:05:37Z",
"pushed_at": "2022-08-15T07:54:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-08-16T16:26:02Z",
"updated_at": "2022-08-17T01:59:16Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 394,
"watchers_count": 394,
"stargazers_count": 395,
"watchers_count": 395,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 394,
"watchers": 395,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-16T17:42:53Z",
"updated_at": "2022-08-17T03:23:23Z",
"pushed_at": "2022-08-15T07:00:18Z",
"stargazers_count": 656,
"watchers_count": 656,
"forks_count": 124,
"stargazers_count": 658,
"watchers_count": 658,
"forks_count": 125,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"gui"
],
"visibility": "public",
"forks": 124,
"watchers": 656,
"forks": 125,
"watchers": 658,
"score": 0
},
{

View file

@ -103,10 +103,10 @@
"description": "Atlassian Confluence Server and Data Center: CVE-2022-26138",
"fork": false,
"created_at": "2022-07-28T09:48:21Z",
"updated_at": "2022-08-04T01:28:06Z",
"updated_at": "2022-08-17T04:56:27Z",
"pushed_at": "2022-07-28T09:59:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -114,7 +114,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -668,10 +668,10 @@
"description": "metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445",
"fork": false,
"created_at": "2022-08-15T12:06:18Z",
"updated_at": "2022-08-16T15:50:49Z",
"updated_at": "2022-08-17T02:55:49Z",
"pushed_at": "2022-08-15T12:08:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -679,7 +679,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2022-08-16T23:49:03Z",
"pushed_at": "2022-08-13T18:02:18Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 4,
"updated_at": "2022-08-17T06:15:35Z",
"pushed_at": "2022-08-17T02:33:15Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 17,
"forks": 5,
"watchers": 30,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Zimbra RCE simple poc",
"fork": false,
"created_at": "2022-08-12T18:35:52Z",
"updated_at": "2022-08-16T18:07:38Z",
"updated_at": "2022-08-17T06:07:55Z",
"pushed_at": "2022-08-13T18:54:58Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 27,
"watchers": 29,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-08-15T15:42:21Z",
"updated_at": "2022-08-17T03:00:17Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 300,
"watchers": 301,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "cve-2022-33891-poc",
"fork": false,
"created_at": "2022-07-18T16:16:51Z",
"updated_at": "2022-08-15T15:42:36Z",
"updated_at": "2022-08-17T02:11:14Z",
"pushed_at": "2022-07-20T08:00:18Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 17,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -25,8 +25,8 @@
"cve-2022-33891"
],
"visibility": "public",
"forks": 17,
"watchers": 43,
"forks": 18,
"watchers": 44,
"score": 0
},
{
@ -43,18 +43,18 @@
"description": "Apache Spark Shell Command Injection Vulnerability",
"fork": false,
"created_at": "2022-07-19T18:52:12Z",
"updated_at": "2022-08-16T16:30:10Z",
"updated_at": "2022-08-17T02:11:03Z",
"pushed_at": "2022-07-22T21:47:53Z",
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 12,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 65,
"forks": 13,
"watchers": 66,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Apache Spark Command Injection PoC Exploit for CVE-2022-33891",
"fork": false,
"created_at": "2022-07-19T23:16:27Z",
"updated_at": "2022-08-13T15:50:10Z",
"updated_at": "2022-08-17T05:20:02Z",
"pushed_at": "2022-07-21T08:32:08Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
"fork": false,
"created_at": "2022-08-11T11:47:17Z",
"updated_at": "2022-08-16T07:31:11Z",
"updated_at": "2022-08-17T02:47:30Z",
"pushed_at": "2022-08-11T19:25:11Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 12,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"webmin"
],
"visibility": "public",
"forks": 12,
"watchers": 29,
"forks": 13,
"watchers": 30,
"score": 0
}
]