Auto Update 2024/08/12 12:30:11

This commit is contained in:
motikan2010-bot 2024-08-12 21:30:11 +09:00
parent 4f9ece9553
commit a71d957183
38 changed files with 242 additions and 149 deletions

View file

@ -13,10 +13,10 @@
"description": "Qualcomm TrustZone kernel privilege escalation",
"fork": false,
"created_at": "2016-06-15T11:21:24Z",
"updated_at": "2024-07-26T02:49:42Z",
"updated_at": "2024-08-12T06:47:56Z",
"pushed_at": "2016-06-15T11:27:42Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 9
},

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-08-07T01:57:31Z",
"updated_at": "2024-08-12T06:19:54Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 841,
"watchers_count": 841,
"stargazers_count": 842,
"watchers_count": 842,
"has_discussions": false,
"forks_count": 425,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 425,
"watchers": 841,
"watchers": 842,
"score": 0,
"subscribers_count": 11
},

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-08-08T19:20:37Z",
"updated_at": "2024-08-12T08:49:58Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 174,
"watchers": 175,
"score": 0,
"subscribers_count": 4
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-08-09T16:04:27Z",
"pushed_at": "2024-08-09T16:04:26Z",
"pushed_at": "2024-08-12T08:43:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-08-09T12:52:50Z",
"updated_at": "2024-08-12T09:59:16Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 180,
"watchers": 181,
"score": 0,
"subscribers_count": 7
}

View file

@ -43,12 +43,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-12T03:02:32Z",
"updated_at": "2024-08-12T11:25:52Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4081,
"watchers_count": 4081,
"stargazers_count": 4083,
"watchers_count": 4083,
"has_discussions": false,
"forks_count": 1087,
"forks_count": 1088,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,8 +74,8 @@
"webshell"
],
"visibility": "public",
"forks": 1087,
"watchers": 4081,
"forks": 1088,
"watchers": 4083,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,12 +13,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-12T03:02:32Z",
"updated_at": "2024-08-12T11:25:52Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4081,
"watchers_count": 4081,
"stargazers_count": 4083,
"watchers_count": 4083,
"has_discussions": false,
"forks_count": 1087,
"forks_count": 1088,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,8 +44,8 @@
"webshell"
],
"visibility": "public",
"forks": 1087,
"watchers": 4081,
"forks": 1088,
"watchers": 4083,
"score": 0,
"subscribers_count": 151
},

View file

@ -373,10 +373,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-08-12T04:28:20Z",
"updated_at": "2024-08-12T09:24:08Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -391,7 +391,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 354,
"watchers": 355,
"score": 0,
"subscribers_count": 5
},
@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-08-08T19:20:37Z",
"updated_at": "2024-08-12T08:49:58Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 174,
"watchers": 175,
"score": 0,
"subscribers_count": 4
},

View file

@ -108,13 +108,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 2

View file

@ -18,13 +18,13 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 19,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 16,
"watchers": 22,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "XSTREAM<=1.4.17漏洞复现CVE-2021-39141、CVE-2021-39144、CVE-2021-39150",
"fork": false,
"created_at": "2021-08-24T06:15:20Z",
"updated_at": "2023-12-28T02:24:56Z",
"updated_at": "2024-08-12T08:20:08Z",
"pushed_at": "2021-08-25T02:00:12Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,7 +13,7 @@
"description": "Private keys generated with vulnerable keypair versions (CVE-2021-41117)",
"fork": false,
"created_at": "2022-05-15T06:56:53Z",
"updated_at": "2024-08-11T17:09:23Z",
"updated_at": "2024-08-12T08:25:02Z",
"pushed_at": "2023-10-12T14:27:08Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -103,10 +103,10 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2024-06-30T18:39:01Z",
"updated_at": "2024-08-12T10:55:28Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 456,
"watchers_count": 456,
"stargazers_count": 457,
"watchers_count": 457,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 456,
"watchers": 457,
"score": 0,
"subscribers_count": 8
},
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-08-09T06:35:06Z",
"updated_at": "2024-08-12T07:39:55Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 795,
"watchers_count": 795,
"stargazers_count": 794,
"watchers_count": 794,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 795,
"watchers": 794,
"score": 0,
"subscribers_count": 11
},
@ -1423,10 +1423,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-08-03T01:09:30Z",
"updated_at": "2024-08-12T11:57:58Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 854,
"watchers_count": 854,
"stargazers_count": 855,
"watchers_count": 855,
"has_discussions": false,
"forks_count": 175,
"allow_forking": true,
@ -1448,7 +1448,7 @@
],
"visibility": "public",
"forks": 175,
"watchers": 854,
"watchers": 855,
"score": 0,
"subscribers_count": 33
},
@ -3364,7 +3364,7 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -3377,7 +3377,7 @@
"security"
],
"visibility": "public",
"forks": 3,
"forks": 5,
"watchers": 7,
"score": 0,
"subscribers_count": 0
@ -3641,13 +3641,13 @@
"stargazers_count": 3392,
"watchers_count": 3392,
"has_discussions": true,
"forks_count": 741,
"forks_count": 740,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 741,
"forks": 740,
"watchers": 3392,
"score": 0,
"subscribers_count": 57

View file

@ -208,10 +208,10 @@
"description": "Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
"fork": false,
"created_at": "2024-07-23T09:44:46Z",
"updated_at": "2024-08-11T17:26:48Z",
"updated_at": "2024-08-12T12:18:51Z",
"pushed_at": "2024-07-23T10:03:08Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 7,
"score": 0,
"subscribers_count": 0
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 529,
"watchers_count": 529,
"has_discussions": false,
"forks_count": 114,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"spookyssl"
],
"visibility": "public",
"forks": 114,
"forks": 113,
"watchers": 529,
"score": 0,
"subscribers_count": 47

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 840469662,
"name": "CVE-2022-44149",
"full_name": "geniuszlyy\/CVE-2022-44149",
"owner": {
"login": "geniuszlyy",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
"fork": false,
"created_at": "2024-08-09T19:27:22Z",
"updated_at": "2024-08-12T07:08:10Z",
"pushed_at": "2024-08-09T19:28:51Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 840470520,
"name": "CVE-2022-45701",
"full_name": "geniuszlyy\/CVE-2022-45701",
"owner": {
"login": "geniuszlyy",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701",
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
"fork": false,
"created_at": "2024-08-09T19:30:20Z",
"updated_at": "2024-08-12T07:08:10Z",
"pushed_at": "2024-08-09T19:31:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 840471119,
"name": "CVE-2022-46080",
"full_name": "geniuszlyy\/CVE-2022-46080",
"owner": {
"login": "geniuszlyy",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080",
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
"fork": false,
"created_at": "2024-08-09T19:32:32Z",
"updated_at": "2024-08-12T07:08:10Z",
"pushed_at": "2024-08-11T07:29:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-46463(Harbor 未授权)",
"fork": false,
"created_at": "2023-01-17T14:58:14Z",
"updated_at": "2024-08-02T07:23:57Z",
"updated_at": "2024-08-12T06:44:33Z",
"pushed_at": "2023-01-19T12:47:21Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,7 +103,7 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-08-06T11:01:47Z",
"updated_at": "2024-08-12T11:16:45Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 880,
"watchers_count": 880,

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)",
"fork": false,
"created_at": "2023-01-24T18:26:10Z",
"updated_at": "2024-07-26T23:47:16Z",
"updated_at": "2024-08-12T09:57:32Z",
"pushed_at": "2023-04-07T20:09:28Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-08-05T11:49:23Z",
"updated_at": "2024-08-12T12:05:04Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 463,
"watchers_count": 463,
"stargazers_count": 462,
"watchers_count": 462,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 463,
"watchers": 462,
"score": 0,
"subscribers_count": 15
}

View file

@ -13,8 +13,8 @@
"description": "Read more at Medium",
"fork": false,
"created_at": "2023-06-01T13:10:31Z",
"updated_at": "2023-06-06T12:20:31Z",
"pushed_at": "2023-06-06T12:18:26Z",
"updated_at": "2024-08-12T11:16:42Z",
"pushed_at": "2024-08-12T11:16:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "MOVEit CVE-2023-34362",
"fork": false,
"created_at": "2023-06-09T19:07:32Z",
"updated_at": "2024-06-28T01:27:11Z",
"updated_at": "2024-08-12T10:55:23Z",
"pushed_at": "2023-06-26T20:24:32Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 135,
"watchers": 136,
"score": 0,
"subscribers_count": 4
},

View file

@ -197,8 +197,8 @@
"description": "Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960",
"fork": false,
"created_at": "2024-07-13T08:30:18Z",
"updated_at": "2024-07-16T09:15:13Z",
"pushed_at": "2024-07-13T08:30:40Z",
"updated_at": "2024-08-12T08:23:17Z",
"pushed_at": "2024-08-12T08:23:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-03T01:14:02Z",
"updated_at": "2024-01-15T09:22:37Z",
"updated_at": "2024-08-12T09:51:53Z",
"pushed_at": "2023-09-27T01:11:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "WonderCMS Authenticated RCE - CVE-2023-41425",
"fork": false,
"created_at": "2023-11-05T15:06:43Z",
"updated_at": "2024-08-11T14:19:05Z",
"updated_at": "2024-08-12T09:52:12Z",
"pushed_at": "2023-11-06T18:56:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
@ -86,10 +86,10 @@
"description": "WonderCMS RCE CVE-2023-41425",
"fork": false,
"created_at": "2024-08-12T06:16:17Z",
"updated_at": "2024-08-12T06:16:20Z",
"pushed_at": "2024-08-12T06:16:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-08-12T07:12:20Z",
"pushed_at": "2024-08-12T06:55:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -98,7 +98,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-08-11T18:08:30Z",
"updated_at": "2024-08-12T12:11:35Z",
"pushed_at": "2024-07-24T13:17:05Z",
"stargazers_count": 1048,
"watchers_count": 1048,
"stargazers_count": 1049,
"watchers_count": 1049,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 180,
"watchers": 1048,
"watchers": 1049,
"score": 0,
"subscribers_count": 17
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-08-11T15:56:56Z",
"updated_at": "2024-08-12T09:57:34Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 194,
"watchers_count": 194,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 193,
"watchers": 194,
"score": 0,
"subscribers_count": 5
},

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/HyHy100"
},
"html_url": "https:\/\/github.com\/HyHy100\/Firefox-CVE-2024-0741",
"description": "PoC for a vulnerability I reported to Firefox in ANGLE Translator (aka WebGL Shader Compiler).",
"description": "PoC for an OOB write vulnerability I reported to Mozilla in ANGLE Translator (aka WebGL Shader Compiler).",
"fork": false,
"created_at": "2024-08-12T05:57:34Z",
"updated_at": "2024-08-12T05:57:45Z",
"pushed_at": "2024-08-12T05:57:35Z",
"updated_at": "2024-08-12T07:26:44Z",
"pushed_at": "2024-08-12T07:26:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
"updated_at": "2024-08-03T01:35:51Z",
"updated_at": "2024-08-12T10:38:27Z",
"pushed_at": "2024-01-17T00:38:28Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 2
},

View file

@ -350,10 +350,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3",
"fork": false,
"created_at": "2024-08-12T04:46:34Z",
"updated_at": "2024-08-12T04:47:06Z",
"updated_at": "2024-08-12T09:45:39Z",
"pushed_at": "2024-08-12T04:47:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -362,7 +362,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "PoC for SQL Injection in CVE-2024-27956",
"fork": false,
"created_at": "2024-05-01T01:58:28Z",
"updated_at": "2024-08-11T10:23:34Z",
"updated_at": "2024-08-12T09:54:04Z",
"pushed_at": "2024-05-03T11:28:21Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "原文已被作者删除备份用非原创EXP & POC",
"fork": false,
"created_at": "2024-08-09T01:18:48Z",
"updated_at": "2024-08-12T05:59:41Z",
"updated_at": "2024-08-12T12:19:29Z",
"pushed_at": "2024-08-09T17:18:10Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 197,
"forks_count": 205,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 197,
"watchers": 280,
"forks": 205,
"watchers": 289,
"score": 0,
"subscribers_count": 5
},
@ -43,19 +43,19 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-08-12T05:57:55Z",
"updated_at": "2024-08-12T10:32:04Z",
"pushed_at": "2024-08-09T10:12:42Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 57,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 136,
"forks": 58,
"watchers": 141,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)",
"fork": false,
"created_at": "2024-08-08T02:40:56Z",
"updated_at": "2024-08-11T23:38:03Z",
"updated_at": "2024-08-12T09:08:52Z",
"pushed_at": "2024-08-11T03:28:23Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-08-12T06:24:15Z",
"updated_at": "2024-08-12T10:12:19Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 2
},

View file

@ -2773,10 +2773,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH. ",
"fork": false,
"created_at": "2024-08-12T06:16:08Z",
"updated_at": "2024-08-12T06:18:40Z",
"updated_at": "2024-08-12T09:44:44Z",
"pushed_at": "2024-08-12T06:18:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2785,7 +2785,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -18063,6 +18063,7 @@
</code>
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149)
### CVE-2022-44183 (2022-11-21)
@ -18340,6 +18341,7 @@
</code>
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701)
### CVE-2022-45728 (2023-01-12)
@ -18399,6 +18401,7 @@
</code>
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080)
### CVE-2022-46087 (2023-01-30)