Auto Update 2024/07/19 12:29:58

This commit is contained in:
motikan2010-bot 2024-07-19 21:29:58 +09:00
parent 4ea948c71d
commit e103084da5
34 changed files with 135 additions and 135 deletions

View file

@ -13,10 +13,10 @@
"description": "Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques",
"fork": false,
"created_at": "2017-10-06T07:59:07Z",
"updated_at": "2024-06-01T20:15:16Z",
"updated_at": "2024-07-19T10:46:33Z",
"pushed_at": "2017-10-06T09:47:43Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 55,
"watchers": 53,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2024-07-14T14:50:37Z",
"updated_at": "2024-07-19T07:29:59Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 752,
"watchers_count": 752,
"stargazers_count": 753,
"watchers_count": 753,
"has_discussions": false,
"forks_count": 170,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 170,
"watchers": 752,
"watchers": 753,
"score": 0,
"subscribers_count": 41
},

View file

@ -13,10 +13,10 @@
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
"fork": false,
"created_at": "2018-08-21T20:29:10Z",
"updated_at": "2024-07-14T00:35:39Z",
"updated_at": "2024-07-19T07:47:25Z",
"pushed_at": "2018-08-21T20:30:24Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 7
}

View file

@ -2897,10 +2897,10 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2024-07-18T18:39:19Z",
"updated_at": "2024-07-19T08:58:58Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -2909,7 +2909,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 233,
"watchers": 234,
"score": 0,
"subscribers_count": 22
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-07-18T08:19:34Z",
"updated_at": "2024-07-19T09:42:25Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4073,
"watchers_count": 4073,
"stargazers_count": 4074,
"watchers_count": 4074,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4073,
"watchers": 4074,
"score": 0,
"subscribers_count": 151
},

View file

@ -147,13 +147,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-07-18T08:19:34Z",
"updated_at": "2024-07-19T09:42:25Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4073,
"watchers_count": 4073,
"stargazers_count": 4074,
"watchers_count": 4074,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4073,
"watchers": 4074,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2024-07-17T14:31:23Z",
"updated_at": "2024-07-19T10:46:41Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 417,
"watchers_count": 417,
"stargazers_count": 416,
"watchers_count": 416,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 417,
"watchers": 416,
"score": 0,
"subscribers_count": 6
}

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-07-19T00:51:07Z",
"updated_at": "2024-07-19T07:51:08Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1279,
"watchers_count": 1279,
"stargazers_count": 1280,
"watchers_count": 1280,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1279,
"watchers": 1280,
"score": 0,
"subscribers_count": 14
}

View file

@ -3636,10 +3636,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-07-17T08:50:43Z",
"updated_at": "2024-07-19T08:53:36Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3386,
"watchers_count": 3386,
"stargazers_count": 3388,
"watchers_count": 3388,
"has_discussions": true,
"forks_count": 741,
"allow_forking": true,
@ -3648,7 +3648,7 @@
"topics": [],
"visibility": "public",
"forks": 741,
"watchers": 3386,
"watchers": 3388,
"score": 0,
"subscribers_count": 57
},

View file

@ -168,10 +168,10 @@
"description": "Exploit for WP BookingPress (< 1.0.11) based on destr4ct POC.",
"fork": false,
"created_at": "2023-01-06T19:07:11Z",
"updated_at": "2024-04-15T17:24:43Z",
"updated_at": "2024-07-19T10:23:33Z",
"pushed_at": "2023-01-17T16:02:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-07-19T00:51:07Z",
"updated_at": "2024-07-19T07:51:08Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1279,
"watchers_count": 1279,
"stargazers_count": 1280,
"watchers_count": 1280,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1279,
"watchers": 1280,
"score": 0,
"subscribers_count": 14
},

View file

@ -321,7 +321,7 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2024-07-10T09:16:48Z",
"updated_at": "2024-07-19T11:01:14Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 372,
"watchers_count": 372,

View file

@ -1424,7 +1424,7 @@
"fork": false,
"created_at": "2023-09-22T17:17:26Z",
"updated_at": "2023-09-22T17:17:44Z",
"pushed_at": "2024-06-20T18:15:37Z",
"pushed_at": "2024-07-19T07:59:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -103,10 +103,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-07-18T22:32:10Z",
"updated_at": "2024-07-19T09:14:17Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 875,
"watchers_count": 875,
"stargazers_count": 876,
"watchers_count": 876,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 875,
"watchers": 876,
"score": 0,
"subscribers_count": 26
},

View file

@ -13,10 +13,10 @@
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
"fork": false,
"created_at": "2023-04-16T10:05:13Z",
"updated_at": "2024-05-26T12:42:30Z",
"updated_at": "2024-07-19T07:24:29Z",
"pushed_at": "2023-05-31T16:06:34Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 81,
"watchers": 80,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-18T11:45:30Z",
"updated_at": "2024-07-19T06:32:12Z",
"updated_at": "2024-07-19T09:49:11Z",
"pushed_at": "2024-07-18T11:48:05Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-01-24T08:33:19Z",
"updated_at": "2024-06-25T23:03:51Z",
"pushed_at": "2023-06-15T14:38:07Z",
"pushed_at": "2024-07-19T06:36:55Z",
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-09T10:49:46Z",
"updated_at": "2024-04-02T17:41:04Z",
"updated_at": "2024-07-19T06:33:08Z",
"pushed_at": "2023-02-09T11:00:26Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 92,
"watchers": 93,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2024-07-09T21:53:06Z",
"updated_at": "2024-07-19T09:36:42Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 214,
"watchers": 215,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,19 +13,19 @@
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
"fork": false,
"created_at": "2023-09-01T07:41:23Z",
"updated_at": "2024-07-18T07:08:11Z",
"updated_at": "2024-07-19T07:34:32Z",
"pushed_at": "2023-11-12T00:42:29Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 153,
"forks": 26,
"watchers": 154,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-06-24T16:05:10Z",
"updated_at": "2024-07-19T10:46:43Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 121,
"watchers": 120,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -38,7 +38,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 21,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6319 proof of concept",
"fork": false,
"created_at": "2024-04-11T18:58:17Z",
"updated_at": "2024-07-18T08:05:02Z",
"updated_at": "2024-07-19T08:16:29Z",
"pushed_at": "2024-04-20T07:37:22Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-07-19T01:45:58Z",
"updated_at": "2024-07-19T12:25:57Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2183,
"watchers_count": 2183,
"stargazers_count": 2186,
"watchers_count": 2186,
"has_discussions": false,
"forks_count": 285,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 285,
"watchers": 2183,
"watchers": 2186,
"score": 0,
"subscribers_count": 23
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-21683 Confluence Post Auth RCE",
"fork": false,
"created_at": "2024-05-23T09:05:40Z",
"updated_at": "2024-07-16T17:30:22Z",
"updated_at": "2024-07-19T09:49:56Z",
"pushed_at": "2024-05-27T03:47:36Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 1
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 6,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Plantronics Desktop Hub LPE",
"fork": false,
"created_at": "2024-05-12T09:53:07Z",
"updated_at": "2024-07-10T09:15:05Z",
"updated_at": "2024-07-19T09:51:54Z",
"pushed_at": "2024-05-15T15:12:59Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,7 +103,7 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-07-19T05:33:25Z",
"updated_at": "2024-07-19T11:01:14Z",
"pushed_at": "2024-07-18T01:28:46Z",
"stargazers_count": 199,
"watchers_count": 199,

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-07-09T19:44:40Z",
"updated_at": "2024-07-11T03:39:55Z",
"updated_at": "2024-07-19T09:09:54Z",
"pushed_at": "2024-07-09T20:21:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -197,11 +197,11 @@
"html_url": "https:\/\/github.com\/MInggongK"
},
"html_url": "https:\/\/github.com\/MInggongK\/geoserver-",
"description": "geoserver CVE-2024-36401 一键漏洞利用工具",
"description": "geoserver CVE-2024-36401 漏洞利用工具",
"fork": false,
"created_at": "2024-07-16T17:29:39Z",
"updated_at": "2024-07-18T09:31:50Z",
"pushed_at": "2024-07-18T09:31:33Z",
"updated_at": "2024-07-19T07:46:15Z",
"pushed_at": "2024-07-19T07:46:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,

View file

@ -133,10 +133,10 @@
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-07-17T02:31:06Z",
"updated_at": "2024-07-19T08:43:32Z",
"pushed_at": "2024-07-07T23:47:58Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -160,7 +160,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0

View file

@ -260,10 +260,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-18T19:30:32Z",
"updated_at": "2024-07-19T09:28:26Z",
"pushed_at": "2024-07-14T09:58:48Z",
"stargazers_count": 411,
"watchers_count": 411,
"stargazers_count": 412,
"watchers_count": 412,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -278,7 +278,7 @@
],
"visibility": "public",
"forks": 83,
"watchers": 411,
"watchers": 412,
"score": 0,
"subscribers_count": 6
},
@ -637,13 +637,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 1
@ -1135,19 +1135,19 @@
"description": null,
"fork": false,
"created_at": "2024-07-02T12:48:27Z",
"updated_at": "2024-07-02T13:18:41Z",
"updated_at": "2024-07-19T10:54:54Z",
"pushed_at": "2024-07-02T13:18:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -1433,10 +1433,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-07-19T02:31:39Z",
"updated_at": "2024-07-19T09:04:04Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -1454,7 +1454,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},
@ -2383,10 +2383,10 @@
"description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.",
"fork": false,
"created_at": "2024-07-09T17:40:19Z",
"updated_at": "2024-07-18T16:37:17Z",
"updated_at": "2024-07-19T11:11:49Z",
"pushed_at": "2024-07-10T15:24:08Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -2395,7 +2395,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 74,
"watchers": 76,
"score": 0,
"subscribers_count": 2
},