Auto Update 2024/12/02 00:31:46

This commit is contained in:
motikan2010-bot 2024-12-02 09:31:47 +09:00
parent 53f1b77c3e
commit ad5769e126
21 changed files with 67 additions and 163 deletions

View file

@ -473,36 +473,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896308520,
"name": "CVE-2017-7921_reproduces_decrypted_file_sharing",
"full_name": "andychao\/CVE-2017-7921_reproduces_decrypted_file_sharing",
"owner": {
"login": "andychao",
"id": 3231537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3231537?v=4",
"html_url": "https:\/\/github.com\/andychao",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/andychao\/CVE-2017-7921_reproduces_decrypted_file_sharing",
"description": "CVE-2017-7921复现解密文件分享 免费下载",
"fork": false,
"created_at": "2024-11-30T02:47:34Z",
"updated_at": "2024-11-30T02:47:38Z",
"pushed_at": "2024-11-30T02:47:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,36 +29,5 @@
"watchers": 262,
"score": 0,
"subscribers_count": 18
},
{
"id": 895828584,
"name": "Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download",
"full_name": "andychao\/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download",
"owner": {
"login": "andychao",
"id": 3231537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3231537?v=4",
"html_url": "https:\/\/github.com\/andychao",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/andychao\/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download",
"description": "远程执行代码漏洞CVE-2018-0886漏洞修复资源下载 免费下载",
"fork": false,
"created_at": "2024-11-29T01:57:06Z",
"updated_at": "2024-11-29T01:57:12Z",
"pushed_at": "2024-11-29T01:57:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-11-29T16:59:54Z",
"updated_at": "2024-12-01T19:27:47Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 207,
"watchers": 208,
"score": 0,
"subscribers_count": 9
}

View file

@ -14,10 +14,10 @@
"description": "A PoC for CVE-2018-7249",
"fork": false,
"created_at": "2018-02-21T20:31:09Z",
"updated_at": "2024-05-15T01:05:05Z",
"updated_at": "2024-12-01T20:02:39Z",
"pushed_at": "2018-03-01T19:06:50Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
}

View file

@ -3117,10 +3117,10 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2024-08-12T19:56:51Z",
"updated_at": "2024-12-01T20:13:31Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -3129,7 +3129,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 323,
"watchers": 324,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,12 +14,12 @@
"description": "CVE-2019-12489",
"fork": false,
"created_at": "2019-09-24T08:28:34Z",
"updated_at": "2021-08-30T20:01:49Z",
"updated_at": "2024-12-01T19:10:08Z",
"pushed_at": "2020-01-19T20:39:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"firmware"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -82,10 +82,10 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2024-11-21T15:29:00Z",
"updated_at": "2024-12-01T23:55:23Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 259,
"watchers_count": 259,
"stargazers_count": 261,
"watchers_count": 261,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 259,
"watchers": 261,
"score": 0,
"subscribers_count": 11
},

View file

@ -132,10 +132,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
"updated_at": "2024-11-18T06:36:21Z",
"updated_at": "2024-12-01T18:36:50Z",
"pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 48,
"watchers": 159,
"watchers": 160,
"score": 0,
"subscribers_count": 1
},

View file

@ -91,36 +91,5 @@
"watchers": 30,
"score": 0,
"subscribers_count": 2
},
{
"id": 896632413,
"name": "zimbra8_lab",
"full_name": "romero-javi\/zimbra8_lab",
"owner": {
"login": "romero-javi",
"id": 95502860,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95502860?v=4",
"html_url": "https:\/\/github.com\/romero-javi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/romero-javi\/zimbra8_lab",
"description": "Zimbra Lab de CVE-2022-37042 y CVE-2022-37393 ",
"fork": false,
"created_at": "2024-11-30T22:06:12Z",
"updated_at": "2024-11-30T22:26:20Z",
"pushed_at": "2024-11-30T22:26:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-11-30T00:38:10Z",
"updated_at": "2024-12-01T23:55:33Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1280,
"watchers_count": 1280,
"stargazers_count": 1281,
"watchers_count": 1281,
"has_discussions": false,
"forks_count": 217,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 217,
"watchers": 1280,
"watchers": 1281,
"score": 0,
"subscribers_count": 20
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-01T16:44:44Z",
"updated_at": "2024-12-02T00:22:08Z",
"pushed_at": "2024-11-29T21:02:56Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-11-26T14:05:19Z",
"updated_at": "2024-12-01T19:10:59Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 287,
"watchers": 288,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software",
"fork": false,
"created_at": "2024-12-01T17:47:16Z",
"updated_at": "2024-12-01T17:49:22Z",
"updated_at": "2024-12-01T22:05:37Z",
"pushed_at": "2024-12-01T17:48:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -192,8 +192,8 @@
},
{
"id": 895404057,
"name": "CVE-2024-23113-poc",
"full_name": "XiaomingX\/CVE-2024-23113-poc",
"name": "cve-2024-23113-poc",
"full_name": "XiaomingX\/cve-2024-23113-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
@ -201,11 +201,11 @@
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-23113-poc",
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-23113-poc",
"description": "CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。",
"fork": false,
"created_at": "2024-11-28T06:30:02Z",
"updated_at": "2024-11-28T06:35:26Z",
"updated_at": "2024-12-02T00:20:29Z",
"pushed_at": "2024-11-28T06:35:22Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-11-26T07:00:07Z",
"updated_at": "2024-12-01T22:10:01Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3497,
"watchers_count": 3497,
"stargazers_count": 3498,
"watchers_count": 3498,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 3497,
"watchers": 3498,
"score": 0,
"subscribers_count": 38
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 223,
"forks_count": 224,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 223,
"forks": 224,
"watchers": 6,
"score": 0,
"subscribers_count": 0

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
"fork": false,
"created_at": "2024-10-27T15:29:56Z",
"updated_at": "2024-11-29T14:10:16Z",
"updated_at": "2024-12-01T19:08:01Z",
"pushed_at": "2024-11-18T15:09:32Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": true,
"forks_count": 10,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
"fork": false,
"created_at": "2024-08-29T16:40:49Z",
"updated_at": "2024-11-24T14:19:49Z",
"updated_at": "2024-12-01T20:43:43Z",
"pushed_at": "2024-09-29T21:58:19Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-8504",
"fork": false,
"created_at": "2024-09-22T20:17:10Z",
"updated_at": "2024-10-02T04:39:27Z",
"updated_at": "2024-12-01T19:54:33Z",
"pushed_at": "2024-10-04T00:43:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -2868,7 +2868,7 @@
- [puckiestyle/CVE-2024-23113](https://github.com/puckiestyle/CVE-2024-23113)
- [expl0itsecurity/CVE-2024-23113](https://github.com/expl0itsecurity/CVE-2024-23113)
- [XiaomingX/cve-2024-23113-exp](https://github.com/XiaomingX/cve-2024-23113-exp)
- [XiaomingX/CVE-2024-23113-poc](https://github.com/XiaomingX/CVE-2024-23113-poc)
- [XiaomingX/cve-2024-23113-poc](https://github.com/XiaomingX/cve-2024-23113-poc)
### CVE-2024-23208 (2024-01-23)
@ -20598,7 +20598,6 @@
- [GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925](https://github.com/GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925)
- [aels/CVE-2022-37042](https://github.com/aels/CVE-2022-37042)
- [0xf4n9x/CVE-2022-37042](https://github.com/0xf4n9x/CVE-2022-37042)
- [romero-javi/zimbra8_lab](https://github.com/romero-javi/zimbra8_lab)
### CVE-2022-37177 (2022-08-29)
@ -38639,7 +38638,6 @@
</code>
- [preempt/credssp](https://github.com/preempt/credssp)
- [andychao/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download](https://github.com/andychao/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download)
### CVE-2018-0952 (2018-08-15)
@ -43014,7 +43012,6 @@
- [yousouf-Tasfin/cve-2017-7921-Mass-Exploit](https://github.com/yousouf-Tasfin/cve-2017-7921-Mass-Exploit)
- [kooroshsanaei/HikVision-CVE-2017-7921](https://github.com/kooroshsanaei/HikVision-CVE-2017-7921)
- [aengussong/hikvision_probe](https://github.com/aengussong/hikvision_probe)
- [andychao/CVE-2017-7921_reproduces_decrypted_file_sharing](https://github.com/andychao/CVE-2017-7921_reproduces_decrypted_file_sharing)
### CVE-2017-7998 (2018-01-08)