Auto Update 2024/12/10 06:32:43

This commit is contained in:
motikan2010-bot 2024-12-10 15:32:43 +09:00
parent 07fe45908b
commit ca84934b58
41 changed files with 170 additions and 170 deletions

View file

@ -467,7 +467,7 @@
"stargazers_count": 864,
"watchers_count": 864,
"has_discussions": false,
"forks_count": 428,
"forks_count": 426,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -477,7 +477,7 @@
"exploit"
],
"visibility": "public",
"forks": 428,
"forks": 426,
"watchers": 864,
"score": 0,
"subscribers_count": 9

View file

@ -19,13 +19,13 @@
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 37,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 37,
"forks": 36,
"watchers": 248,
"score": 0,
"subscribers_count": 6

View file

@ -231,10 +231,10 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2024-12-04T10:14:02Z",
"updated_at": "2024-12-10T04:01:54Z",
"pushed_at": "2023-05-08T16:23:06Z",
"stargazers_count": 437,
"watchers_count": 437,
"stargazers_count": 438,
"watchers_count": 438,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 437,
"watchers": 438,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2024-10-29T15:29:52Z",
"updated_at": "2024-12-10T05:19:06Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 712,
"watchers_count": 712,
"stargazers_count": 713,
"watchers_count": 713,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 173,
"watchers": 712,
"watchers": 713,
"score": 0,
"subscribers_count": 19
},

View file

@ -45,10 +45,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-12-08T02:32:11Z",
"updated_at": "2024-12-10T04:10:22Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1738,
"watchers_count": 1738,
"stargazers_count": 1739,
"watchers_count": 1739,
"has_discussions": false,
"forks_count": 359,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 359,
"watchers": 1738,
"watchers": 1739,
"score": 0,
"subscribers_count": 86
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 16,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 14,
"watchers": 25,
"score": 0,
"subscribers_count": 3

View file

@ -29,36 +29,5 @@
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 875359853,
"name": "CVE-2021-39433",
"full_name": "ibnurusdianto\/CVE-2021-39433",
"owner": {
"login": "ibnurusdianto",
"id": 43640284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43640284?v=4",
"html_url": "https:\/\/github.com\/ibnurusdianto",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ibnurusdianto\/CVE-2021-39433",
"description": "Kerentanan ini merupakan jenis Local File Inclusion (LFI) yang terdapat pada versi BIQS IT Biqs-drive v1.83 dan di bawahnya. Kerentanan ini dapat dieksploitasi dengan mengirimkan payload tertentu sebagai parameter file ke download\/index.php",
"fork": false,
"created_at": "2024-10-19T19:04:27Z",
"updated_at": "2024-10-20T03:19:51Z",
"pushed_at": "2024-10-20T03:19:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-12-06T12:17:35Z",
"updated_at": "2024-12-10T04:31:07Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1603,
"watchers_count": 1603,
"stargazers_count": 1604,
"watchers_count": 1604,
"has_discussions": false,
"forks_count": 482,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 482,
"watchers": 1603,
"watchers": 1604,
"score": 0,
"subscribers_count": 28
},
@ -541,10 +541,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-11-11T02:10:31Z",
"updated_at": "2024-12-10T00:17:07Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 800,
"watchers_count": 800,
"stargazers_count": 801,
"watchers_count": 801,
"has_discussions": false,
"forks_count": 170,
"allow_forking": true,
@ -560,7 +560,7 @@
],
"visibility": "public",
"forks": 170,
"watchers": 800,
"watchers": 801,
"score": 0,
"subscribers_count": 18
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 463,
"watchers_count": 463,
"has_discussions": false,
"forks_count": 91,
"forks_count": 92,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"cve-2021-40449"
],
"visibility": "public",
"forks": 91,
"forks": 92,
"watchers": 463,
"score": 0,
"subscribers_count": 13

View file

@ -19,7 +19,7 @@
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,7 +31,7 @@
"wifi-camera"
],
"visibility": "public",
"forks": 10,
"forks": 9,
"watchers": 72,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-12-08T09:34:30Z",
"updated_at": "2024-12-10T00:50:46Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 990,
"watchers_count": 990,
"stargazers_count": 991,
"watchers_count": 991,
"has_discussions": false,
"forks_count": 190,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 990,
"watchers": 991,
"score": 0,
"subscribers_count": 24
},

View file

@ -1467,10 +1467,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-11-12T20:26:27Z",
"updated_at": "2024-12-10T01:40:39Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 852,
"watchers_count": 852,
"stargazers_count": 851,
"watchers_count": 851,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -1492,7 +1492,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 852,
"watchers": 851,
"score": 0,
"subscribers_count": 33
},
@ -10710,6 +10710,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 447404470,
"name": "log4shell",
"full_name": "jxerome\/log4shell",
"owner": {
"login": "jxerome",
"id": 1355634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4",
"html_url": "https:\/\/github.com\/jxerome",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jxerome\/log4shell",
"description": "Démo du fonctionnement de log4shell (CVE-2021-44228)",
"fork": false,
"created_at": "2022-01-12T23:44:20Z",
"updated_at": "2022-01-12T23:59:13Z",
"pushed_at": "2022-01-14T14:03:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 447754863,
"name": "log4j_github_repository",

View file

@ -1163,10 +1163,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-12-07T20:37:29Z",
"updated_at": "2024-12-10T01:23:32Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 558,
"watchers_count": 558,
"stargazers_count": 557,
"watchers_count": 557,
"has_discussions": false,
"forks_count": 142,
"allow_forking": true,
@ -1175,7 +1175,7 @@
"topics": [],
"visibility": "public",
"forks": 142,
"watchers": 558,
"watchers": 557,
"score": 0,
"subscribers_count": 15
},

View file

@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-12-04T06:54:46Z",
"updated_at": "2024-12-10T05:41:58Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 884,
"watchers_count": 884,
"stargazers_count": 883,
"watchers_count": 883,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 884,
"watchers": 883,
"score": 0,
"subscribers_count": 25
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-28T03:09:00Z",
"updated_at": "2024-10-09T08:05:43Z",
"updated_at": "2024-12-10T02:59:17Z",
"pushed_at": "2024-07-18T20:07:11Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -798,10 +798,10 @@
"description": "CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户从而完全控制设备。",
"fork": false,
"created_at": "2024-11-22T04:10:28Z",
"updated_at": "2024-12-08T18:37:34Z",
"updated_at": "2024-12-10T03:08:29Z",
"pushed_at": "2024-11-22T04:12:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -810,7 +810,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -76,10 +76,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2024-11-30T14:21:20Z",
"updated_at": "2024-12-10T02:34:56Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 176,
"watchers_count": 176,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 175,
"watchers": 176,
"score": 0,
"subscribers_count": 3
},

View file

@ -49,10 +49,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-12-05T17:13:39Z",
"updated_at": "2024-12-10T03:54:16Z",
"pushed_at": "2024-08-24T13:38:50Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 271,
"watchers_count": 271,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 270,
"watchers": 271,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现",
"fork": false,
"created_at": "2023-09-08T05:43:12Z",
"updated_at": "2024-10-28T16:18:44Z",
"updated_at": "2024-12-10T02:18:01Z",
"pushed_at": "2023-09-08T05:48:52Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 2
}

View file

@ -342,6 +342,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Technical Details and Exploit for CVE-2024-11393",
"fork": false,
"created_at": "2024-12-07T11:24:06Z",
"updated_at": "2024-12-09T17:16:32Z",
"updated_at": "2024-12-10T04:18:23Z",
"pushed_at": "2024-12-08T00:31:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-06T03:59:20Z",
"updated_at": "2024-12-10T03:31:43Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 32,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"fork": false,
"created_at": "2024-12-04T18:42:43Z",
"updated_at": "2024-12-07T21:52:28Z",
"updated_at": "2024-12-10T05:27:17Z",
"pushed_at": "2024-12-04T19:25:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-12-02T21:31:13Z",
"updated_at": "2024-12-10T03:08:06Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 8
},

View file

@ -169,10 +169,10 @@
"description": "Windows AppLocker Driver (appid.sys) LPE",
"fork": false,
"created_at": "2024-07-29T13:18:06Z",
"updated_at": "2024-12-09T02:39:50Z",
"updated_at": "2024-12-10T01:35:06Z",
"pushed_at": "2024-07-29T13:29:59Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -186,7 +186,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-02-15T19:57:38Z",
"updated_at": "2024-11-06T01:28:23Z",
"updated_at": "2024-12-10T06:03:40Z",
"pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 154,
"watchers": 155,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software",
"fork": false,
"created_at": "2024-12-01T17:47:16Z",
"updated_at": "2024-12-01T22:05:37Z",
"updated_at": "2024-12-10T05:31:10Z",
"pushed_at": "2024-12-01T17:48:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -372,6 +372,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
"fork": false,
"created_at": "2024-12-09T04:59:07Z",
"updated_at": "2024-12-09T17:19:08Z",
"updated_at": "2024-12-10T06:04:55Z",
"pushed_at": "2024-12-09T05:09:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,8 +57,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-10T00:28:13Z",
"updated_at": "2024-12-10T05:43:18Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 25,
"forks": 16,
"watchers": 29,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "The BerqWP Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads",
"fork": false,
"created_at": "2024-09-17T04:19:54Z",
"updated_at": "2024-10-21T13:18:16Z",
"updated_at": "2024-12-10T02:51:46Z",
"pushed_at": "2024-09-17T04:30:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE",
"fork": false,
"created_at": "2024-09-24T05:50:03Z",
"updated_at": "2024-10-08T13:47:15Z",
"updated_at": "2024-12-10T02:51:42Z",
"pushed_at": "2024-09-24T05:52:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-11-20T16:30:48Z",
"updated_at": "2024-12-10T01:57:46Z",
"pushed_at": "2024-06-11T04:46:42Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 78,
"forks": 18,
"watchers": 79,
"score": 0,
"subscribers_count": 3
},
@ -548,10 +548,10 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-12-06T08:24:22Z",
"updated_at": "2024-12-10T05:57:56Z",
"pushed_at": "2024-07-21T20:27:03Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -560,7 +560,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 123,
"watchers": 124,
"score": 0,
"subscribers_count": 1
},

View file

@ -282,6 +282,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
"fork": false,
"created_at": "2024-10-27T15:29:56Z",
"updated_at": "2024-12-02T11:19:03Z",
"updated_at": "2024-12-10T04:48:35Z",
"pushed_at": "2024-11-18T15:09:32Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": true,
"forks_count": 10,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
"fork": false,
"created_at": "2024-08-29T16:40:49Z",
"updated_at": "2024-12-01T20:43:43Z",
"updated_at": "2024-12-10T01:25:37Z",
"pushed_at": "2024-09-29T21:58:19Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 2
}

View file

@ -126,6 +126,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -26958,7 +26958,6 @@
</code>
- [PinkDraconian/CVE-2021-39433](https://github.com/PinkDraconian/CVE-2021-39433)
- [ibnurusdianto/CVE-2021-39433](https://github.com/ibnurusdianto/CVE-2021-39433)
### CVE-2021-39473 (2022-11-04)
@ -28728,6 +28727,7 @@
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)