Auto Update 2023/06/28 00:23:47

This commit is contained in:
motikan2010-bot 2023-06-28 09:23:47 +09:00
parent 1d65508238
commit ad6e6cadc7
51 changed files with 139 additions and 686 deletions

View file

@ -33,35 +33,5 @@
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 421212210,
"name": "cve-2000-0649",
"full_name": "stevenvegar\/cve-2000-0649",
"owner": {
"login": "stevenvegar",
"id": 70730301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4",
"html_url": "https:\/\/github.com\/stevenvegar"
},
"html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649",
"description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers",
"fork": false,
"created_at": "2021-10-25T23:14:04Z",
"updated_at": "2021-12-17T07:02:21Z",
"pushed_at": "2021-10-25T23:32:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,66 +29,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 29933656,
"name": "CVE-2015-0235-cookbook",
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
"owner": {
"login": "mikesplain",
"id": 881965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4",
"html_url": "https:\/\/github.com\/mikesplain"
},
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
"description": "A chef cookbook to test the GHOST vulnerability",
"fork": false,
"created_at": "2015-01-27T20:34:42Z",
"updated_at": "2017-09-29T11:32:54Z",
"pushed_at": "2015-01-27T21:41:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 29941036,
"name": "CVE-2015-0235-test",
"full_name": "aaronfay\/CVE-2015-0235-test",
"owner": {
"login": "aaronfay",
"id": 1033941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1033941?v=4",
"html_url": "https:\/\/github.com\/aaronfay"
},
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-27T23:45:22Z",
"updated_at": "2023-03-07T20:55:14Z",
"pushed_at": "2015-01-29T03:33:29Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},
{
"id": 29942046,
"name": "ghost",
@ -209,66 +149,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 30004399,
"name": "cfengine-CVE_2015_0235",
"full_name": "nickanderson\/cfengine-CVE_2015_0235",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
"description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
"fork": false,
"created_at": "2015-01-29T04:58:54Z",
"updated_at": "2016-02-13T01:41:47Z",
"pushed_at": "2015-01-29T21:23:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 30008427,
"name": "cookbook-update-glibc",
"full_name": "koudaiii-archives\/cookbook-update-glibc",
"owner": {
"login": "koudaiii-archives",
"id": 51727289,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51727289?v=4",
"html_url": "https:\/\/github.com\/koudaiii-archives"
},
"html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc",
"description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
"fork": false,
"created_at": "2015-01-29T07:14:17Z",
"updated_at": "2023-01-28T20:14:16Z",
"pushed_at": "2015-01-29T07:38:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 30019912,
"name": "ghostbusters15",
@ -299,36 +179,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 30066365,
"name": "CVE-2015-0235",
"full_name": "tobyzxj\/CVE-2015-0235",
"owner": {
"login": "tobyzxj",
"id": 4661855,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4",
"html_url": "https:\/\/github.com\/tobyzxj"
},
"html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
"description": "glibc gethostbyname bug",
"fork": false,
"created_at": "2015-01-30T09:58:09Z",
"updated_at": "2020-10-17T20:24:46Z",
"pushed_at": "2015-01-30T10:02:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 30183649,
"name": "CVE-2015-0235-workaround",

View file

@ -73,10 +73,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2023-06-20T11:38:37Z",
"updated_at": "2023-06-27T20:02:18Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 926,
"watchers_count": 926,
"stargazers_count": 927,
"watchers_count": 927,
"has_discussions": false,
"forks_count": 405,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 405,
"watchers": 926,
"watchers": 927,
"score": 0,
"subscribers_count": 65
},

View file

@ -73,10 +73,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2023-06-25T06:42:09Z",
"updated_at": "2023-06-27T19:13:02Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 350,
"watchers_count": 350,
"stargazers_count": 351,
"watchers_count": 351,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -91,7 +91,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 350,
"watchers": 351,
"score": 0,
"subscribers_count": 10
},

View file

@ -43,10 +43,10 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2023-02-21T15:05:18Z",
"updated_at": "2023-06-27T20:52:06Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 9
},

View file

@ -59,66 +59,6 @@
"score": 0,
"subscribers_count": 22
},
{
"id": 153477523,
"name": "CVE-2018-10933",
"full_name": "hook-s3c\/CVE-2018-10933",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
"fork": false,
"created_at": "2018-10-17T15:09:41Z",
"updated_at": "2021-12-05T20:25:44Z",
"pushed_at": "2018-10-17T15:09:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 153506738,
"name": "CVE-2018-10933",
"full_name": "kn6869610\/CVE-2018-10933",
"owner": {
"login": "kn6869610",
"id": 6917744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
"html_url": "https:\/\/github.com\/kn6869610"
},
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
"fork": false,
"created_at": "2018-10-17T18:44:05Z",
"updated_at": "2021-12-05T20:25:52Z",
"pushed_at": "2018-10-17T18:45:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
{
"id": 153534574,
"name": "libssh-scanner",
@ -149,101 +89,6 @@
"score": 0,
"subscribers_count": 18
},
{
"id": 153562229,
"name": "CVE-2018-10933_ssh",
"full_name": "likescam\/CVE-2018-10933_ssh",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
"description": null,
"fork": false,
"created_at": "2018-10-18T04:10:25Z",
"updated_at": "2021-12-05T20:26:01Z",
"pushed_at": "2018-10-18T04:10:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 153598283,
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
"full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"description": null,
"fork": false,
"created_at": "2018-10-18T09:27:08Z",
"updated_at": "2021-12-05T20:26:14Z",
"pushed_at": "2018-10-18T09:27:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 153643745,
"name": "hunt-for-cve-2018-10933",
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
"owner": {
"login": "marco-lancini",
"id": 1472968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
"html_url": "https:\/\/github.com\/marco-lancini"
},
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
"fork": false,
"created_at": "2018-10-18T15:08:25Z",
"updated_at": "2023-06-20T11:06:21Z",
"pushed_at": "2018-10-18T15:11:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"elasticsearch",
"exploit",
"nmap",
"pentesting"
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 153675108,
"name": "cve-2018-10933",
@ -304,100 +149,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 153855090,
"name": "CVE-2018-10933",
"full_name": "jas502n\/CVE-2018-10933",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
"description": "libssh CVE-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:24:04Z",
"updated_at": "2023-05-23T04:45:13Z",
"pushed_at": "2018-10-20T00:29:04Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},
{
"id": 153856713,
"name": "cve-2018-10933_poc",
"full_name": "ninp0\/cve-2018-10933_poc",
"owner": {
"login": "ninp0",
"id": 1008583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
"html_url": "https:\/\/github.com\/ninp0"
},
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:53:24Z",
"updated_at": "2018-10-22T15:05:53Z",
"pushed_at": "2018-10-20T01:53:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2018-10933",
"exploit",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 153878160,
"name": "CVE-2018-10933_Scanner",
"full_name": "pghook\/CVE-2018-10933_Scanner",
"owner": {
"login": "pghook",
"id": 14160529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
"html_url": "https:\/\/github.com\/pghook"
},
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
"description": null,
"fork": false,
"created_at": "2018-10-20T06:53:59Z",
"updated_at": "2020-05-15T17:20:56Z",
"pushed_at": "2018-10-20T04:54:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 153920395,
"name": "POC-CVE-2018-10933",
@ -428,36 +179,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 153975086,
"name": "pythonprojects-CVE-2018-10933",
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
"owner": {
"login": "shifa123",
"id": 18241082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
"html_url": "https:\/\/github.com\/shifa123"
},
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-21T05:01:12Z",
"updated_at": "2022-01-03T19:20:42Z",
"pushed_at": "2018-10-21T05:13:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 154050332,
"name": "CVE-2018-10933",

View file

@ -1,38 +0,0 @@
[
{
"id": 153770795,
"name": "CVE-2018-12018",
"full_name": "k3v142\/CVE-2018-12018",
"owner": {
"login": "k3v142",
"id": 12337759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4",
"html_url": "https:\/\/github.com\/k3v142"
},
"html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018",
"description": "EPoD (Ethereum Packet of Death)",
"fork": false,
"created_at": "2018-10-19T11:11:01Z",
"updated_at": "2023-01-28T19:03:04Z",
"pushed_at": "2018-10-20T21:07:42Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ethereum",
"ethereum-node",
"exploit",
"python",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -59,36 +59,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 152906288,
"name": "MikroRoot",
"full_name": "syrex1013\/MikroRoot",
"owner": {
"login": "syrex1013",
"id": 31669127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
"html_url": "https:\/\/github.com\/syrex1013"
},
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
"fork": false,
"created_at": "2018-10-13T19:17:42Z",
"updated_at": "2021-12-06T20:08:10Z",
"pushed_at": "2018-10-14T08:39:24Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},
{
"id": 161894724,
"name": "CVE-2018-14847",

View file

@ -18,7 +18,7 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0

View file

@ -149,36 +149,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 151921677,
"name": "CVE-2018-2893",
"full_name": "jas502n\/CVE-2018-2893",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893",
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-10-07T08:41:14Z",
"updated_at": "2023-06-02T07:03:04Z",
"pushed_at": "2018-10-07T09:53:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 219763712,
"name": "CVE-2018-2893",

View file

@ -1597,7 +1597,7 @@
"forks": 22,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 188287755,
@ -2082,7 +2082,7 @@
"forks": 15,
"watchers": 41,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 189959275,
@ -2478,7 +2478,7 @@
"forks": 97,
"watchers": 293,
"score": 0,
"subscribers_count": 20
"subscribers_count": 21
},
{
"id": 198731225,

View file

@ -267,7 +267,7 @@
"forks": 45,
"watchers": 144,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
},
{
"id": 218080163,

View file

@ -493,7 +493,7 @@
"forks": 4,
"watchers": 14,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 382906478,

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -57,7 +57,7 @@
"forks": 63,
"watchers": 210,
"score": 0,
"subscribers_count": 15
"subscribers_count": 16
},
{
"id": 248283931,

View file

@ -43,10 +43,10 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2023-06-20T23:45:09Z",
"updated_at": "2023-06-27T21:29:33Z",
"pushed_at": "2022-04-14T18:23:38Z",
"stargazers_count": 299,
"watchers_count": 299,
"stargazers_count": 301,
"watchers_count": 301,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 299,
"watchers": 301,
"score": 0,
"subscribers_count": 12
},

View file

@ -27,7 +27,7 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 349235683,

View file

@ -35,6 +35,6 @@
"forks": 7,
"watchers": 14,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 11,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
}
]

View file

@ -32,7 +32,7 @@
"forks": 136,
"watchers": 665,
"score": 0,
"subscribers_count": 42
"subscribers_count": 43
},
{
"id": 263921419,

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2023-06-26T20:40:00Z",
"updated_at": "2023-06-27T20:02:22Z",
"pushed_at": "2023-02-06T19:18:56Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 9
},

View file

@ -1096,10 +1096,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2023-06-27T02:17:44Z",
"updated_at": "2023-06-27T19:32:09Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1262,
"watchers_count": 1262,
"stargazers_count": 1263,
"watchers_count": 1263,
"has_discussions": false,
"forks_count": 368,
"allow_forking": true,
@ -1114,7 +1114,7 @@
],
"visibility": "public",
"forks": 368,
"watchers": 1262,
"watchers": 1263,
"score": 0,
"subscribers_count": 34
},
@ -1398,7 +1398,7 @@
"forks": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 255573167,

View file

@ -27,6 +27,6 @@
"forks": 10,
"watchers": 40,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -27,7 +27,7 @@
"forks": 32,
"watchers": 87,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 280822745,

View file

@ -67,7 +67,7 @@
"forks": 2,
"watchers": 13,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 286767343,

View file

@ -27,7 +27,7 @@
"forks": 43,
"watchers": 159,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 499143889,

View file

@ -27,7 +27,7 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 307446561,

View file

@ -57,7 +57,7 @@
"forks": 359,
"watchers": 1592,
"score": 0,
"subscribers_count": 89
"subscribers_count": 90
},
{
"id": 295480770,
@ -154,7 +154,7 @@
"forks": 65,
"watchers": 348,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
},
{
"id": 295515909,

View file

@ -256,7 +256,7 @@
"forks": 5,
"watchers": 21,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 304797048,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -35,6 +35,6 @@
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -33,6 +33,6 @@
"forks": 4,
"watchers": 17,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -57,7 +57,7 @@
"forks": 27,
"watchers": 95,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 281263657,

View file

@ -13,10 +13,10 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2023-04-13T16:01:26Z",
"updated_at": "2023-06-27T20:42:31Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 4
}

View file

@ -27,6 +27,6 @@
"forks": 12,
"watchers": 24,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
"fork": false,
"created_at": "2021-06-09T15:44:00Z",
"updated_at": "2023-06-08T12:37:33Z",
"updated_at": "2023-06-27T19:12:24Z",
"pushed_at": "2021-06-26T18:31:23Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 6
}

View file

@ -114,7 +114,7 @@
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -127,7 +127,7 @@
"windowsexploits"
],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 88,
"score": 0,
"subscribers_count": 8

View file

@ -4726,5 +4726,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 659471096,
"name": "lab_cve-2021-4034-polkit-emulation-and-detection",
"full_name": "ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
"owner": {
"login": "ps-interactive",
"id": 35313392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4",
"html_url": "https:\/\/github.com\/ps-interactive"
},
"html_url": "https:\/\/github.com\/ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
"description": null,
"fork": false,
"created_at": "2023-06-27T23:06:02Z",
"updated_at": "2023-06-27T23:15:26Z",
"pushed_at": "2023-06-27T23:21:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-06-27T03:46:09Z",
"updated_at": "2023-06-27T21:26:15Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 691,
"watchers_count": 691,
"stargazers_count": 692,
"watchers_count": 692,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 691,
"watchers": 692,
"score": 0,
"subscribers_count": 10
},

View file

@ -1215,10 +1215,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-06-27T02:11:14Z",
"updated_at": "2023-06-27T21:20:13Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 419,
"watchers_count": 419,
"stargazers_count": 420,
"watchers_count": 420,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -1227,7 +1227,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 419,
"watchers": 420,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2023-06-24T19:27:47Z",
"updated_at": "2023-06-27T21:58:35Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 152,
"watchers": 153,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2023-06-23T14:21:49Z",
"updated_at": "2023-06-27T23:24:09Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 534,
"watchers_count": 534,
"stargazers_count": 533,
"watchers_count": 533,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 534,
"watchers": 533,
"score": 0,
"subscribers_count": 49
},

View file

@ -1333,10 +1333,10 @@
"description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ",
"fork": false,
"created_at": "2023-06-27T08:29:24Z",
"updated_at": "2023-06-27T09:01:59Z",
"updated_at": "2023-06-27T20:49:18Z",
"pushed_at": "2023-06-27T09:01:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1345,7 +1345,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -226,10 +226,10 @@
"description": "ImageMagick LFI PoC [CVE-2022-44268]",
"fork": false,
"created_at": "2023-02-06T10:44:43Z",
"updated_at": "2023-06-26T18:05:55Z",
"updated_at": "2023-06-27T23:04:53Z",
"pushed_at": "2023-02-06T10:48:56Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -242,7 +242,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 0
},

View file

@ -103,10 +103,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2023-06-27T12:36:24Z",
"updated_at": "2023-06-27T20:00:59Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 31,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-32243",
"fork": false,
"created_at": "2023-05-15T09:39:45Z",
"updated_at": "2023-06-26T07:09:48Z",
"updated_at": "2023-06-27T22:55:35Z",
"pushed_at": "2023-06-05T08:13:19Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 3
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
"fork": false,
"created_at": "2023-06-12T12:56:12Z",
"updated_at": "2023-06-23T10:46:57Z",
"updated_at": "2023-06-27T21:38:55Z",
"pushed_at": "2023-06-13T08:46:03Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 3
},

View file

@ -1817,35 +1817,35 @@
- [leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below](https://github.com/leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below)
### CVE-2023-34835 (-)
### CVE-2023-34835 (2023-06-27)
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.
</code>
- [sahiloj/CVE-2023-34835](https://github.com/sahiloj/CVE-2023-34835)
### CVE-2023-34836 (-)
### CVE-2023-34836 (2023-06-27)
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Dtltyp and ListName parameters.
</code>
- [sahiloj/CVE-2023-34836](https://github.com/sahiloj/CVE-2023-34836)
### CVE-2023-34837 (-)
### CVE-2023-34837 (2023-06-27)
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a vulnerable parameter GrpPath.
</code>
- [sahiloj/CVE-2023-34837](https://github.com/sahiloj/CVE-2023-34837)
### CVE-2023-34838 (-)
### CVE-2023-34838 (2023-06-27)
<code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Description parameter.
</code>
- [sahiloj/CVE-2023-34838](https://github.com/sahiloj/CVE-2023-34838)
### CVE-2023-34839 (-)
### CVE-2023-34839 (2023-06-27)
<code>A Cross Site Request Forgery (CSRF) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via a Custom CSRF exploit to create new user function in the application.
</code>
@ -1855,6 +1855,9 @@
### CVE-2023-34840
- [Xh4H/CVE-2023-34840](https://github.com/Xh4H/CVE-2023-34840)
### CVE-2023-34843
- [rootd4ddy/CVE-2023-34843](https://github.com/rootd4ddy/CVE-2023-34843)
### CVE-2023-34852 (2023-06-15)
<code>PublicCMS &lt;=V4.0.202302 is vulnerable to Insecure Permissions.
@ -9115,6 +9118,7 @@
- [mutur4/CVE-2021-4034](https://github.com/mutur4/CVE-2021-4034)
- [crypticdante/CVE-2021-4034_Python3](https://github.com/crypticdante/CVE-2021-4034_Python3)
- [TheSermux/CVE-2021-4034](https://github.com/TheSermux/CVE-2021-4034)
- [ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection](https://github.com/ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection)
### CVE-2021-4043 (2022-02-04)
@ -23341,7 +23345,6 @@
- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
- [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893)
- [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893)
### CVE-2018-2894 (2018-07-18)
@ -24703,19 +24706,10 @@
- [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933)
- [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933)
- [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933)
- [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933)
- [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner)
- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
- [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
@ -24893,13 +24887,6 @@
- [anmuxi-bai/CVE-2018-11790](https://github.com/anmuxi-bai/CVE-2018-11790)
### CVE-2018-12018 (2018-07-04)
<code>The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue.
</code>
- [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018)
### CVE-2018-12031 (2018-06-07)
<code>Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
@ -25211,7 +25198,6 @@
- [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC)
- [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit)
- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
- [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
- [Tr33-He11/winboxPOC](https://github.com/Tr33-He11/winboxPOC)
@ -29670,16 +29656,11 @@
</code>
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
- [piyokango/ghost](https://github.com/piyokango/ghost)
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
- [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc)
@ -33115,7 +33096,6 @@
</code>
- [rafaelh/CVE-2000-0649](https://github.com/rafaelh/CVE-2000-0649)
- [stevenvegar/cve-2000-0649](https://github.com/stevenvegar/cve-2000-0649)
### CVE-2000-0979 (2001-01-22)