Auto Update 2024/02/15 00:26:05

This commit is contained in:
motikan2010-bot 2024-02-15 09:26:05 +09:00
parent 951f0fb641
commit a10c02d54b
29 changed files with 142 additions and 142 deletions

View file

@ -13,10 +13,10 @@
"description": "Under Construction :) Please come back later",
"fork": false,
"created_at": "2023-12-01T23:59:07Z",
"updated_at": "2023-12-01T23:59:36Z",
"updated_at": "2024-02-15T00:00:16Z",
"pushed_at": "2023-12-02T02:40:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-09T22:25:02Z",
"updated_at": "2023-12-10T16:51:42Z",
"updated_at": "2024-02-15T00:00:14Z",
"pushed_at": "2023-12-09T22:25:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2024-01-12T13:09:20Z",
"updated_at": "2024-02-14T20:54:27Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 194,
"watchers_count": 194,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 111,
"watchers": 193,
"watchers": 194,
"score": 0,
"subscribers_count": 9
},

View file

@ -349,10 +349,10 @@
"description": "CVE-2019-15107 exploit",
"fork": false,
"created_at": "2020-09-13T03:11:29Z",
"updated_at": "2023-11-26T17:53:32Z",
"updated_at": "2024-02-14T20:09:47Z",
"pushed_at": "2020-11-19T22:32:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -365,7 +365,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,7 +36,7 @@
"zimbra"
],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 74,
"score": 0,
"subscribers_count": 4

View file

@ -73,19 +73,19 @@
"description": null,
"fork": false,
"created_at": "2020-09-14T16:52:37Z",
"updated_at": "2024-01-15T09:30:07Z",
"updated_at": "2024-02-14T21:19:15Z",
"pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 37,
"forks": 10,
"watchers": 38,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,19 +13,19 @@
"description": "SD-91948: CVE-2020-35682: Authentication Bypass Vulnerability during SAML login in ServiceDesk Plus.",
"fork": false,
"created_at": "2021-03-04T12:43:01Z",
"updated_at": "2023-10-25T09:20:58Z",
"updated_at": "2024-02-14T21:47:53Z",
"pushed_at": "2021-03-04T12:47:46Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"forks": 5,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-02-08T07:47:27Z",
"updated_at": "2024-02-14T22:17:24Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 947,
"watchers_count": 947,
"stargazers_count": 948,
"watchers_count": 948,
"has_discussions": false,
"forks_count": 192,
"forks_count": 193,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 192,
"watchers": 947,
"forks": 193,
"watchers": 948,
"score": 0,
"subscribers_count": 26
},
@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-02-11T01:47:20Z",
"updated_at": "2024-02-14T20:33:48Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 686,
"watchers_count": 686,
"stargazers_count": 687,
"watchers_count": 687,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 686,
"watchers": 687,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-02-02T16:29:11Z",
"updated_at": "2024-02-14T21:14:22Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1279,
"watchers_count": 1279,
"stargazers_count": 1280,
"watchers_count": 1280,
"has_discussions": false,
"forks_count": 318,
"forks_count": 319,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 318,
"watchers": 1279,
"forks": 319,
"watchers": 1280,
"score": 0,
"subscribers_count": 27
},

View file

@ -369,10 +369,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2024-02-13T11:00:58Z",
"updated_at": "2024-02-14T20:10:01Z",
"pushed_at": "2023-05-11T11:29:46Z",
"stargazers_count": 1083,
"watchers_count": 1083,
"stargazers_count": 1082,
"watchers_count": 1082,
"has_discussions": false,
"forks_count": 522,
"allow_forking": true,
@ -383,7 +383,7 @@
],
"visibility": "public",
"forks": 522,
"watchers": 1083,
"watchers": 1082,
"score": 0,
"subscribers_count": 23
},
@ -760,10 +760,10 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
"updated_at": "2024-01-29T17:31:41Z",
"updated_at": "2024-02-14T20:02:04Z",
"pushed_at": "2021-12-13T22:27:25Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 193,
"watchers_count": 193,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -772,7 +772,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 192,
"watchers": 193,
"score": 0,
"subscribers_count": 6
},
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-02-14T15:19:54Z",
"updated_at": "2024-02-14T19:36:04Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1706,
"watchers_count": 1706,
"stargazers_count": 1707,
"watchers_count": 1707,
"has_discussions": false,
"forks_count": 504,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 504,
"watchers": 1706,
"watchers": 1707,
"score": 0,
"subscribers_count": 27
},
@ -3666,10 +3666,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-02-14T08:32:35Z",
"updated_at": "2024-02-14T21:36:35Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3330,
"watchers_count": 3330,
"stargazers_count": 3331,
"watchers_count": 3331,
"has_discussions": true,
"forks_count": 749,
"allow_forking": true,
@ -3678,7 +3678,7 @@
"topics": [],
"visibility": "public",
"forks": 749,
"watchers": 3330,
"watchers": 3331,
"score": 0,
"subscribers_count": 58
},

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-12-15T17:57:26Z",
"updated_at": "2022-09-13T22:30:53Z",
"updated_at": "2024-02-14T21:46:08Z",
"pushed_at": "2022-10-30T12:26:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2024-02-05T22:16:40Z",
"updated_at": "2024-02-14T21:46:57Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 553,
"watchers_count": 553,
"stargazers_count": 554,
"watchers_count": 554,
"has_discussions": false,
"forks_count": 97,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 97,
"watchers": 553,
"watchers": 554,
"score": 0,
"subscribers_count": 7
},

View file

@ -59,36 +59,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 534947024,
"name": "CVE-2022-24637",
"full_name": "garySec\/CVE-2022-24637",
"owner": {
"login": "garySec",
"id": 81690072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81690072?v=4",
"html_url": "https:\/\/github.com\/garySec"
},
"html_url": "https:\/\/github.com\/garySec\/CVE-2022-24637",
"description": "Unauthicated RCE for open-web-analytics(1.7.3)",
"fork": false,
"created_at": "2022-09-10T09:11:44Z",
"updated_at": "2023-10-19T18:37:05Z",
"pushed_at": "2022-09-10T09:12:15Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 548059345,
"name": "CVE-2022-24637",

View file

@ -13,10 +13,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
"updated_at": "2024-01-07T19:57:56Z",
"updated_at": "2024-02-14T19:50:25Z",
"pushed_at": "2022-12-18T03:36:03Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 69,
"watchers": 68,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Let's control Secure Boot Chain ourselves.",
"fork": false,
"created_at": "2023-12-01T07:32:18Z",
"updated_at": "2024-02-13T05:53:56Z",
"updated_at": "2024-02-14T23:56:03Z",
"pushed_at": "2024-01-25T01:35:44Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -326,13 +326,13 @@
"stargazers_count": 359,
"watchers_count": 359,
"has_discussions": false,
"forks_count": 81,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 81,
"forks": 82,
"watchers": 359,
"score": 0,
"subscribers_count": 7

View file

@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-02-14T17:38:27Z",
"updated_at": "2024-02-14T21:57:39Z",
"pushed_at": "2024-02-11T03:01:51Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 2
},

View file

@ -290,10 +290,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
"fork": false,
"created_at": "2023-02-13T02:00:51Z",
"updated_at": "2024-01-20T22:31:16Z",
"updated_at": "2024-02-14T21:19:52Z",
"pushed_at": "2023-12-29T14:53:55Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -315,7 +315,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-30533",
"fork": false,
"created_at": "2023-08-09T06:48:32Z",
"updated_at": "2023-09-17T13:03:19Z",
"updated_at": "2024-02-14T23:58:37Z",
"pushed_at": "2023-08-09T06:52:13Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -428,7 +428,7 @@
"description": "CVES ",
"fork": false,
"created_at": "2024-02-13T20:59:34Z",
"updated_at": "2024-02-14T06:45:40Z",
"updated_at": "2024-02-14T19:35:49Z",
"pushed_at": "2024-02-13T21:47:25Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -146,13 +146,13 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 35,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-02-12T15:24:54Z",
"updated_at": "2024-02-14T22:10:20Z",
"pushed_at": "2024-02-06T21:45:34Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 3
},
@ -43,10 +43,10 @@
"description": "CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)",
"fork": false,
"created_at": "2024-01-16T07:44:35Z",
"updated_at": "2024-02-11T13:04:23Z",
"updated_at": "2024-02-14T22:20:23Z",
"pushed_at": "2024-01-15T15:16:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},

View file

@ -600,5 +600,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 757561414,
"name": "ExploitScript-CVE-2023-46604",
"full_name": "ST3G4N05\/ExploitScript-CVE-2023-46604",
"owner": {
"login": "ST3G4N05",
"id": 67293586,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67293586?v=4",
"html_url": "https:\/\/github.com\/ST3G4N05"
},
"html_url": "https:\/\/github.com\/ST3G4N05\/ExploitScript-CVE-2023-46604",
"description": null,
"fork": false,
"created_at": "2024-02-14T18:39:49Z",
"updated_at": "2024-02-14T19:20:54Z",
"pushed_at": "2024-02-14T19:19:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-02T02:51:29Z",
"updated_at": "2024-02-14T17:19:25Z",
"updated_at": "2024-02-14T23:17:59Z",
"pushed_at": "2024-02-02T09:49:34Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -6494,6 +6494,7 @@
- [dcm2406/CVE-2023-46604](https://github.com/dcm2406/CVE-2023-46604)
- [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ)
- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
- [ST3G4N05/ExploitScript-CVE-2023-46604](https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604)
### CVE-2023-46615 (2024-02-12)
@ -9577,7 +9578,6 @@
- [JacobEbben/CVE-2022-24637](https://github.com/JacobEbben/CVE-2022-24637)
- [Lay0us1/CVE-2022-24637](https://github.com/Lay0us1/CVE-2022-24637)
- [garySec/CVE-2022-24637](https://github.com/garySec/CVE-2022-24637)
- [hupe1980/CVE-2022-24637](https://github.com/hupe1980/CVE-2022-24637)
- [icebreack/CVE-2022-24637](https://github.com/icebreack/CVE-2022-24637)
- [Pflegusch/CVE-2022-24637](https://github.com/Pflegusch/CVE-2022-24637)