Auto Update 2024/01/06 12:28:02

This commit is contained in:
motikan2010-bot 2024-01-06 21:28:02 +09:00
parent 9d519c6fd6
commit df8a824045
19 changed files with 85 additions and 116 deletions

View file

@ -73,10 +73,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2024-01-04T16:08:26Z",
"updated_at": "2024-01-06T11:39:06Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 936,
"watchers_count": 936,
"stargazers_count": 938,
"watchers_count": 938,
"has_discussions": false,
"forks_count": 402,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 402,
"watchers": 936,
"watchers": 938,
"score": 0,
"subscribers_count": 65
},

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2023-12-05T03:00:27Z",
"updated_at": "2024-01-06T11:36:40Z",
"pushed_at": "2023-02-06T19:18:56Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-01-04T16:50:06Z",
"updated_at": "2024-01-06T11:49:16Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1662,
"watchers_count": 1662,
"stargazers_count": 1663,
"watchers_count": 1663,
"has_discussions": false,
"forks_count": 369,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 369,
"watchers": 1662,
"watchers": 1663,
"score": 0,
"subscribers_count": 88
},
@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-01-04T16:50:17Z",
"updated_at": "2024-01-06T11:49:17Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1110,
"watchers_count": 1110,
"stargazers_count": 1111,
"watchers_count": 1111,
"has_discussions": false,
"forks_count": 287,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 287,
"watchers": 1110,
"watchers": 1111,
"score": 0,
"subscribers_count": 35
},

View file

@ -108,36 +108,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 304044860,
"name": "CVE-2020-16898",
"full_name": "ZephrFish\/CVE-2020-16898",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-16898",
"description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2023-03-01T05:20:04Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},
{
"id": 304075693,
"name": "cve-2020-16898",

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-01-06T04:31:46Z",
"updated_at": "2024-01-06T08:51:09Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1504,
"watchers_count": 1504,
"stargazers_count": 1505,
"watchers_count": 1505,
"has_discussions": false,
"forks_count": 490,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 490,
"watchers": 1504,
"watchers": 1505,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-01-05T09:29:56Z",
"updated_at": "2024-01-06T11:41:28Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 245,
"watchers": 246,
"score": 0,
"subscribers_count": 8
}

View file

@ -13,10 +13,10 @@
"description": "The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc",
"fork": false,
"created_at": "2023-03-02T20:18:54Z",
"updated_at": "2023-05-05T02:40:10Z",
"updated_at": "2024-01-06T10:07:56Z",
"pushed_at": "2023-03-25T17:41:13Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2024-01-04T17:10:00Z",
"updated_at": "2024-01-06T10:06:55Z",
"pushed_at": "2022-08-30T13:23:51Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 261,
"watchers_count": 261,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 262,
"watchers": 261,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-01-03T00:19:09Z",
"updated_at": "2024-01-06T11:38:45Z",
"pushed_at": "2024-01-01T13:58:49Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"has_discussions": true,
"forks_count": 20,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 139,
"watchers": 140,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
"fork": false,
"created_at": "2023-06-13T13:17:23Z",
"updated_at": "2023-12-24T12:46:44Z",
"updated_at": "2024-01-06T12:04:53Z",
"pushed_at": "2023-06-13T14:39:17Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 221,
"watchers": 222,
"score": 0,
"subscribers_count": 4
},
@ -80,13 +80,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -116,13 +116,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 36,
"score": 0,
"subscribers_count": 1

View file

@ -13,12 +13,12 @@
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on user login function.",
"fork": false,
"created_at": "2023-09-16T01:05:16Z",
"updated_at": "2023-09-29T14:53:18Z",
"updated_at": "2024-01-06T09:07:00Z",
"pushed_at": "2023-09-29T14:53:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,8 +26,8 @@
"xss"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "mooSocial v3.1.8 is vulnerable to Cross Site Request Forgery (CSRF) which allows attacker to change admin password.",
"fork": false,
"created_at": "2023-09-26T15:25:42Z",
"updated_at": "2023-10-07T01:28:43Z",
"updated_at": "2024-01-06T09:09:36Z",
"pushed_at": "2023-10-07T01:31:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on Admin redirect function.",
"fork": false,
"created_at": "2023-09-26T15:47:50Z",
"updated_at": "2023-10-07T01:33:21Z",
"updated_at": "2024-01-06T09:09:47Z",
"pushed_at": "2023-10-07T01:32:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on Invite Friend function.",
"fork": false,
"created_at": "2023-09-26T16:16:46Z",
"updated_at": "2023-10-07T01:36:02Z",
"updated_at": "2024-01-06T09:10:03Z",
"pushed_at": "2023-10-07T01:35:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on search function.",
"fork": false,
"created_at": "2023-09-26T12:59:31Z",
"updated_at": "2023-10-14T04:47:03Z",
"updated_at": "2024-01-06T09:10:15Z",
"pushed_at": "2023-10-14T04:47:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco",
"fork": false,
"created_at": "2023-12-08T20:47:52Z",
"updated_at": "2023-12-19T20:54:31Z",
"updated_at": "2024-01-06T10:36:05Z",
"pushed_at": "2023-12-09T10:54:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,8 +34,8 @@
"server-side-template-injection"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -184,10 +184,10 @@
"description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
"fork": false,
"created_at": "2024-01-06T04:07:07Z",
"updated_at": "2024-01-06T06:18:14Z",
"pushed_at": "2024-01-06T04:11:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2024-01-06T12:04:43Z",
"pushed_at": "2024-01-06T10:33:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -196,7 +196,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -22762,7 +22762,6 @@
- [advanced-threat-research/CVE-2020-16898](https://github.com/advanced-threat-research/CVE-2020-16898)
- [corelight/CVE-2020-16898](https://github.com/corelight/CVE-2020-16898)
- [Maliek/CVE-2020-16898_Check](https://github.com/Maliek/CVE-2020-16898_Check)
- [ZephrFish/CVE-2020-16898](https://github.com/ZephrFish/CVE-2020-16898)
- [esnet-security/cve-2020-16898](https://github.com/esnet-security/cve-2020-16898)
- [initconf/CVE-2020-16898-Bad-Neighbor](https://github.com/initconf/CVE-2020-16898-Bad-Neighbor)
- [Q1984/CVE-2020-16898](https://github.com/Q1984/CVE-2020-16898)