Auto Update 2022/12/18 18:22:41

This commit is contained in:
motikan2010-bot 2022-12-19 03:22:41 +09:00
parent f2717f80ec
commit a73d160225
25 changed files with 90 additions and 90 deletions

View file

@ -158,10 +158,10 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2022-10-22T01:23:22Z",
"updated_at": "2022-12-18T14:36:04Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 574,
"watchers_count": 574,
"stargazers_count": 573,
"watchers_count": 573,
"has_discussions": false,
"forks_count": 229,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 229,
"watchers": 574,
"watchers": 573,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
"fork": false,
"created_at": "2021-05-17T04:39:32Z",
"updated_at": "2022-12-16T05:12:51Z",
"updated_at": "2022-12-18T15:30:05Z",
"pushed_at": "2021-11-18T11:07:54Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Python implementation of Roundcube LFI (CVE-2017-16651)",
"fork": false,
"created_at": "2021-01-06T01:46:39Z",
"updated_at": "2022-12-17T23:28:14Z",
"updated_at": "2022-12-18T15:55:36Z",
"pushed_at": "2021-01-06T01:47:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-12-16T04:13:11Z",
"updated_at": "2022-12-17T12:30:01Z",
"pushed_at": "2022-12-16T04:20:29Z",
"pushed_at": "2022-12-18T14:48:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,19 +13,19 @@
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
"fork": false,
"created_at": "2022-05-26T01:13:42Z",
"updated_at": "2022-12-16T17:20:46Z",
"updated_at": "2022-12-18T13:23:29Z",
"pushed_at": "2022-05-26T19:14:20Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 33,
"forks": 7,
"watchers": 34,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-18649 EXP",
"fork": false,
"created_at": "2020-05-07T07:37:34Z",
"updated_at": "2020-05-08T01:28:53Z",
"updated_at": "2022-12-18T13:33:13Z",
"pushed_at": "2020-05-07T09:58:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -367,10 +367,10 @@
"description": "CVE-2019-15107 exploit",
"fork": false,
"created_at": "2020-09-13T03:11:29Z",
"updated_at": "2022-11-15T20:54:20Z",
"updated_at": "2022-12-18T15:52:32Z",
"pushed_at": "2020-11-19T22:32:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -383,7 +383,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -429,10 +429,10 @@
"description": null,
"fork": false,
"created_at": "2020-11-09T21:46:57Z",
"updated_at": "2022-12-02T15:42:07Z",
"updated_at": "2022-12-18T15:53:51Z",
"pushed_at": "2022-06-07T08:33:35Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -441,7 +441,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -158,10 +158,10 @@
"description": "Android privilege escalation via an use-after-free in binder.c",
"fork": false,
"created_at": "2020-02-17T11:53:54Z",
"updated_at": "2022-12-01T10:28:10Z",
"updated_at": "2022-12-18T14:32:07Z",
"pushed_at": "2020-04-14T07:04:15Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -172,7 +172,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 33,
"watchers": 34,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2022-11-15T00:23:21Z",
"updated_at": "2022-12-18T15:46:11Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 28,
"watchers": 29,
"score": 0
}
]

View file

@ -460,13 +460,13 @@
"stargazers_count": 845,
"watchers_count": 845,
"has_discussions": false,
"forks_count": 239,
"forks_count": 238,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 239,
"forks": 238,
"watchers": 845,
"score": 0
},

View file

@ -42,7 +42,7 @@
"description": "Win10 20H2 Weaponized LPE for CVE-2021-31956",
"fork": false,
"created_at": "2022-09-02T10:35:11Z",
"updated_at": "2022-12-15T00:36:13Z",
"updated_at": "2022-12-18T14:15:35Z",
"pushed_at": "2022-09-02T10:40:04Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-38163 - exploit for SAP Netveawer",
"fork": false,
"created_at": "2022-09-10T03:41:52Z",
"updated_at": "2022-09-10T03:42:14Z",
"updated_at": "2022-12-18T15:50:16Z",
"pushed_at": "2022-09-10T04:42:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"wifi-camera"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 19,
"score": 0
},

View file

@ -1020,10 +1020,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-12-15T12:09:46Z",
"updated_at": "2022-12-18T17:06:57Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3143,
"watchers_count": 3143,
"stargazers_count": 3144,
"watchers_count": 3144,
"has_discussions": true,
"forks_count": 736,
"allow_forking": true,
@ -1032,7 +1032,7 @@
"topics": [],
"visibility": "public",
"forks": 736,
"watchers": 3143,
"watchers": 3144,
"score": 0
},
{

View file

@ -192,13 +192,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 8,
"score": 0
},

View file

@ -185,10 +185,10 @@
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2022-12-15T10:44:24Z",
"updated_at": "2022-12-18T18:09:46Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -197,7 +197,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -138,13 +138,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 409,
"watchers_count": 409,
"has_discussions": false,
"forks_count": 59,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 59,
"forks": 58,
"watchers": 409,
"score": 0
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -35,7 +35,7 @@
"use-after-free"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 66,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2022-12-16T01:57:01Z",
"updated_at": "2022-12-18T13:59:43Z",
"pushed_at": "2022-12-13T15:26:57Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 328,
"watchers_count": 328,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 327,
"watchers": 328,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
"fork": false,
"created_at": "2022-12-09T22:48:38Z",
"updated_at": "2022-12-17T20:47:18Z",
"updated_at": "2022-12-18T14:52:49Z",
"pushed_at": "2022-12-11T13:37:22Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"rce"
],
"visibility": "public",
"forks": 17,
"watchers": 76,
"forks": 18,
"watchers": 77,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for Acronis Arbitrary File Read - CVE-2022-45451",
"fork": false,
"created_at": "2022-12-15T19:16:20Z",
"updated_at": "2022-12-17T13:45:46Z",
"updated_at": "2022-12-18T13:06:46Z",
"pushed_at": "2022-12-15T19:57:17Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Pwndoc local file inclusion to remote code execution of Node.js code on the server",
"fork": false,
"created_at": "2022-12-13T10:03:14Z",
"updated_at": "2022-12-18T11:51:59Z",
"updated_at": "2022-12-18T18:07:51Z",
"pushed_at": "2022-12-14T11:37:39Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 25,
"watchers": 26,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.",
"fork": false,
"created_at": "2022-12-08T01:52:13Z",
"updated_at": "2022-12-18T02:20:41Z",
"updated_at": "2022-12-18T18:07:57Z",
"pushed_at": "2022-12-08T02:50:46Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2022-12-18T12:16:00Z",
"updated_at": "2022-12-18T18:11:35Z",
"pushed_at": "2022-12-17T16:45:42Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 46,
"watchers": 59,
"score": 0
}
]