Auto Update 2024/12/23 00:31:21

This commit is contained in:
motikan2010-bot 2024-12-23 09:31:21 +09:00
parent ba18109659
commit db783d7640
26 changed files with 94 additions and 94 deletions

View file

@ -14,10 +14,10 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2024-12-11T16:08:17Z",
"updated_at": "2024-12-22T22:08:22Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 526,
"watchers_count": 526,
"stargazers_count": 527,
"watchers_count": 527,
"has_discussions": false,
"forks_count": 198,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 198,
"watchers": 526,
"watchers": 527,
"score": 0,
"subscribers_count": 33
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-12-20T11:54:48Z",
"updated_at": "2024-12-22T19:40:46Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1799,
"watchers_count": 1799,
"stargazers_count": 1800,
"watchers_count": 1800,
"has_discussions": false,
"forks_count": 249,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 249,
"watchers": 1799,
"watchers": 1800,
"score": 0,
"subscribers_count": 37
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-01T21:35:40Z",
"updated_at": "2024-10-31T14:53:35Z",
"updated_at": "2024-12-22T22:46:57Z",
"pushed_at": "2023-09-02T10:41:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,6 @@
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -14,8 +14,8 @@
"description": "Productization efforts of CVE-2020-11179 Adreno-Qualcomm-GPU bug, original poc by Ben Hawkes of P0",
"fork": false,
"created_at": "2024-10-28T00:50:57Z",
"updated_at": "2024-11-29T07:00:41Z",
"pushed_at": "2024-11-09T23:57:58Z",
"updated_at": "2024-12-22T22:43:52Z",
"pushed_at": "2024-12-22T22:43:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -311,10 +311,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-12-21T16:34:28Z",
"updated_at": "2024-12-22T22:39:33Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 1020,
"watchers_count": 1020,
"stargazers_count": 1021,
"watchers_count": 1021,
"has_discussions": false,
"forks_count": 231,
"allow_forking": true,
@ -323,7 +323,7 @@
"topics": [],
"visibility": "public",
"forks": 231,
"watchers": 1020,
"watchers": 1021,
"score": 0,
"subscribers_count": 26
},

View file

@ -244,10 +244,10 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-12-06T12:04:45Z",
"updated_at": "2024-12-22T22:38:53Z",
"pushed_at": "2024-05-19T16:25:52Z",
"stargazers_count": 786,
"watchers_count": 786,
"stargazers_count": 787,
"watchers_count": 787,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -256,7 +256,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 786,
"watchers": 787,
"score": 0,
"subscribers_count": 10
},

View file

@ -789,10 +789,10 @@
"description": "CVE-2021-42013, a critical vulnerability in the Apache HTTP Server (2.4.50)",
"fork": false,
"created_at": "2024-06-26T13:57:52Z",
"updated_at": "2024-11-20T16:30:52Z",
"updated_at": "2024-12-22T19:10:01Z",
"pushed_at": "2024-06-27T17:57:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -801,7 +801,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2024-12-01T17:54:04Z",
"updated_at": "2024-12-22T19:55:17Z",
"pushed_at": "2022-06-05T21:06:13Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 156,
"watchers": 157,
"score": 0,
"subscribers_count": 4
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 395,
"watchers_count": 395,
"has_discussions": false,
"forks_count": 34,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 33,
"watchers": 395,
"score": 0,
"subscribers_count": 11

View file

@ -14,7 +14,7 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-12-20T16:45:50Z",
"updated_at": "2024-12-22T23:14:00Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 486,
"watchers_count": 486,

View file

@ -180,10 +180,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2024-11-01T10:38:43Z",
"updated_at": "2024-12-22T22:15:31Z",
"pushed_at": "2024-08-04T01:00:35Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 67,
"watchers": 66,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-22T05:35:08Z",
"updated_at": "2024-12-22T18:57:35Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1308,
"watchers_count": 1308,
"stargazers_count": 1309,
"watchers_count": 1309,
"has_discussions": false,
"forks_count": 221,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1308,
"watchers": 1309,
"score": 0,
"subscribers_count": 21
},

View file

@ -113,10 +113,10 @@
"description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
"fork": false,
"created_at": "2024-11-19T10:07:28Z",
"updated_at": "2024-11-28T06:03:52Z",
"updated_at": "2024-12-22T19:11:03Z",
"pushed_at": "2024-11-19T12:20:16Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -134,7 +134,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-12-14T18:01:42Z",
"updated_at": "2024-12-22T19:56:08Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 327,
"watchers_count": 327,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 326,
"watchers": 327,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-11-20T16:30:53Z",
"updated_at": "2024-12-22T20:26:26Z",
"pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473",
"fork": false,
"created_at": "2024-08-23T14:39:31Z",
"updated_at": "2024-11-20T22:45:58Z",
"updated_at": "2024-12-22T21:45:53Z",
"pushed_at": "2024-08-24T22:42:42Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
"fork": false,
"created_at": "2024-07-19T03:51:54Z",
"updated_at": "2024-12-18T19:19:46Z",
"updated_at": "2024-12-22T19:42:49Z",
"pushed_at": "2024-07-19T04:01:13Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 67,
"forks": 14,
"watchers": 68,
"score": 0,
"subscribers_count": 1
},
@ -76,10 +76,10 @@
"description": "exploit CVE-2024-40725 (Apache httpd) with ",
"fork": false,
"created_at": "2024-12-18T15:09:38Z",
"updated_at": "2024-12-20T10:19:49Z",
"updated_at": "2024-12-22T22:56:07Z",
"pushed_at": "2024-12-18T15:12:31Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -116,13 +116,13 @@
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 23,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 22,
"watchers": 167,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-20T03:46:38Z",
"updated_at": "2024-12-22T22:50:00Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "A short scraper looking for a POC of CVE-2024-49112",
"fork": false,
"created_at": "2024-12-16T13:41:40Z",
"updated_at": "2024-12-17T22:31:50Z",
"updated_at": "2024-12-22T20:04:42Z",
"pushed_at": "2024-12-16T19:35:02Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,10 +138,10 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2024-12-22T17:35:02Z",
"updated_at": "2024-12-22T19:20:55Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
"fork": false,
"created_at": "2024-10-04T12:49:19Z",
"updated_at": "2024-12-21T00:23:39Z",
"updated_at": "2024-12-22T22:56:07Z",
"pushed_at": "2024-12-19T09:34:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -50,13 +50,13 @@
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 67,
"score": 0,
"subscribers_count": 3

View file

@ -14,8 +14,8 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-12-22T16:48:57Z",
"pushed_at": "2024-10-04T09:39:09Z",
"updated_at": "2024-12-22T21:34:29Z",
"pushed_at": "2024-12-22T21:34:26Z",
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,