Auto Update 2024/08/27 00:29:13

This commit is contained in:
motikan2010-bot 2024-08-27 09:29:13 +09:00
parent 75b01fb8f3
commit d6b13e9b57
27 changed files with 90 additions and 90 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-25T08:35:22Z",
"updated_at": "2024-08-26T22:16:04Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1972,
"watchers_count": 1972,
"stargazers_count": 1973,
"watchers_count": 1973,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1972,
"watchers": 1973,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-25T08:35:22Z",
"updated_at": "2024-08-26T22:16:04Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1972,
"watchers_count": 1972,
"stargazers_count": 1973,
"watchers_count": 1973,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1972,
"watchers": 1973,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-25T08:35:22Z",
"updated_at": "2024-08-26T22:16:04Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1972,
"watchers_count": 1972,
"stargazers_count": 1973,
"watchers_count": 1973,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1972,
"watchers": 1973,
"score": 0,
"subscribers_count": 35
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"security-vulnerability"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 15,
"score": 0,
"subscribers_count": 4

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2018-07-02T02:21:28Z",
"updated_at": "2023-12-01T07:49:05Z",
"updated_at": "2024-08-26T18:38:39Z",
"pushed_at": "2019-05-09T07:07:25Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 5
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-25T08:35:22Z",
"updated_at": "2024-08-26T22:16:04Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1972,
"watchers_count": 1972,
"stargazers_count": 1973,
"watchers_count": 1973,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1972,
"watchers": 1973,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-26T14:25:01Z",
"updated_at": "2024-08-26T23:39:38Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4092,
"watchers_count": 4092,
"stargazers_count": 4093,
"watchers_count": 4093,
"has_discussions": false,
"forks_count": 1089,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1089,
"watchers": 4092,
"watchers": 4093,
"score": 0,
"subscribers_count": 149
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-25T08:35:22Z",
"updated_at": "2024-08-26T22:16:04Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1972,
"watchers_count": 1972,
"stargazers_count": 1973,
"watchers_count": 1973,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1972,
"watchers": 1973,
"score": 0,
"subscribers_count": 35
}

View file

@ -78,7 +78,7 @@
"description": "𓃌 - Atlassian Jira Information Disclosure SLA & Field names",
"fork": false,
"created_at": "2024-05-24T15:49:09Z",
"updated_at": "2024-05-25T16:38:42Z",
"updated_at": "2024-08-26T21:33:26Z",
"pushed_at": "2024-05-24T16:00:06Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-26T14:25:01Z",
"updated_at": "2024-08-26T23:39:38Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4092,
"watchers_count": 4092,
"stargazers_count": 4093,
"watchers_count": 4093,
"has_discussions": false,
"forks_count": 1089,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1089,
"watchers": 4092,
"watchers": 4093,
"score": 0,
"subscribers_count": 149
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-25T08:35:22Z",
"updated_at": "2024-08-26T22:16:04Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1972,
"watchers_count": 1972,
"stargazers_count": 1973,
"watchers_count": 1973,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1972,
"watchers": 1973,
"score": 0,
"subscribers_count": 35
},

View file

@ -696,10 +696,10 @@
"description": "POC exploit for CVE-2021-21972",
"fork": false,
"created_at": "2021-04-22T14:00:38Z",
"updated_at": "2024-08-21T09:04:18Z",
"updated_at": "2024-08-26T18:25:34Z",
"pushed_at": "2022-07-21T20:14:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -708,7 +708,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -3591,6 +3591,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-08-23T09:14:35Z",
"updated_at": "2024-08-26T21:41:56Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 773,
"watchers_count": 773,
"stargazers_count": 774,
"watchers_count": 774,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 773,
"watchers": 774,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-08-25T18:50:01Z",
"updated_at": "2024-08-26T21:39:52Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 251,
"watchers_count": 251,
"has_discussions": true,
"forks_count": 36,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 250,
"watchers": 251,
"score": 0,
"subscribers_count": 5
},

View file

@ -86,7 +86,7 @@
"description": "WonderCMS RCE CVE-2023-41425",
"fork": false,
"created_at": "2024-08-12T06:16:17Z",
"updated_at": "2024-08-26T15:21:36Z",
"updated_at": "2024-08-26T22:26:15Z",
"pushed_at": "2024-08-12T06:55:30Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-08-26T16:42:47Z",
"updated_at": "2024-08-26T22:12:56Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1090,
"watchers_count": 1090,
"stargazers_count": 1091,
"watchers_count": 1091,
"has_discussions": false,
"forks_count": 188,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 188,
"watchers": 1090,
"watchers": 1091,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-07-08T16:48:29Z",
"updated_at": "2024-08-17T18:58:35Z",
"pushed_at": "2024-08-17T18:58:30Z",
"pushed_at": "2024-08-26T21:37:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -206,10 +206,10 @@
"description": "The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.",
"fork": false,
"created_at": "2023-11-05T18:02:59Z",
"updated_at": "2024-01-22T07:53:10Z",
"updated_at": "2024-08-26T21:06:11Z",
"pushed_at": "2023-11-05T18:40:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,7 +13,7 @@
"description": "LiteSpeed Cache Privilege Escalation PoC",
"fork": false,
"created_at": "2024-08-24T05:12:56Z",
"updated_at": "2024-08-26T05:20:46Z",
"updated_at": "2024-08-26T22:43:15Z",
"pushed_at": "2024-08-25T03:06:56Z",
"stargazers_count": 10,
"watchers_count": 10,

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.",
"fork": false,
"created_at": "2024-06-19T01:46:33Z",
"updated_at": "2024-07-29T04:42:46Z",
"updated_at": "2024-08-26T23:37:47Z",
"pushed_at": "2024-07-29T04:42:43Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-08-26T16:33:45Z",
"updated_at": "2024-08-26T21:51:05Z",
"pushed_at": "2024-08-19T15:29:58Z",
"stargazers_count": 309,
"watchers_count": 309,
"stargazers_count": 310,
"watchers_count": 310,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 309,
"watchers": 310,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "Exploit POC for CVE-2024-36877",
"fork": false,
"created_at": "2024-08-09T15:33:04Z",
"updated_at": "2024-08-26T02:49:03Z",
"updated_at": "2024-08-26T23:10:01Z",
"pushed_at": "2024-08-14T15:26:18Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -256,19 +256,19 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-08-26T18:03:55Z",
"updated_at": "2024-08-27T00:21:33Z",
"pushed_at": "2024-08-26T08:14:55Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 4,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"forks": 7,
"watchers": 45,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept code for interaction with Firewalla via Bluetooth Low-Energy and exploitation of CVE-2024-40892 \/ CVE-2024-40893",
"fork": false,
"created_at": "2024-08-21T17:27:21Z",
"updated_at": "2024-08-26T15:31:27Z",
"updated_at": "2024-08-26T22:39:25Z",
"pushed_at": "2024-08-21T17:35:50Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -163,7 +163,7 @@
"description": "Telerik Report Server deserialization and authentication bypass exploit chain for CVE-2024-4358\/CVE-2024-1800",
"fork": false,
"created_at": "2024-08-24T10:09:09Z",
"updated_at": "2024-08-24T10:48:47Z",
"updated_at": "2024-08-27T00:24:46Z",
"pushed_at": "2024-08-24T10:48:43Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2024-5932",
"fork": false,
"created_at": "2024-08-25T11:51:36Z",
"updated_at": "2024-08-26T13:06:01Z",
"updated_at": "2024-08-26T23:00:51Z",
"pushed_at": "2024-08-26T13:05:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}