Auto Update 2024/07/06 12:28:59

This commit is contained in:
motikan2010-bot 2024-07-06 21:28:59 +09:00
parent f2ef2e8a55
commit e3d773265e
29 changed files with 184 additions and 191 deletions

View file

@ -13,19 +13,25 @@
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
"updated_at": "2024-07-06T01:03:51Z",
"pushed_at": "2024-07-02T10:55:06Z",
"stargazers_count": 20,
"watchers_count": 20,
"updated_at": "2024-07-06T10:48:32Z",
"pushed_at": "2024-07-06T10:47:30Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"openssh",
"security-audit",
"security-tools",
"ssh",
"ssh-server"
],
"visibility": "public",
"forks": 1,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -48,13 +54,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,19 +13,25 @@
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
"updated_at": "2024-07-06T01:03:51Z",
"pushed_at": "2024-07-02T10:55:06Z",
"stargazers_count": 20,
"watchers_count": 20,
"updated_at": "2024-07-06T10:48:32Z",
"pushed_at": "2024-07-06T10:47:30Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"openssh",
"security-audit",
"security-tools",
"ssh",
"ssh-server"
],
"visibility": "public",
"forks": 1,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2024-07-02T13:16:51Z",
"updated_at": "2024-07-06T10:53:51Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 641,
"watchers_count": 641,
"stargazers_count": 642,
"watchers_count": 642,
"has_discussions": false,
"forks_count": 130,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 130,
"watchers": 641,
"watchers": 642,
"score": 0,
"subscribers_count": 16
},

View file

@ -2610,35 +2610,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824678662,
"name": "CVE-2018-6574",
"full_name": "athulmur\/CVE-2018-6574",
"owner": {
"login": "athulmur",
"id": 60314086,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60314086?v=4",
"html_url": "https:\/\/github.com\/athulmur"
},
"html_url": "https:\/\/github.com\/athulmur\/CVE-2018-6574",
"description": "A POC to demonstrate CVE-2018-6574",
"fork": false,
"created_at": "2024-07-05T17:06:18Z",
"updated_at": "2024-07-05T19:45:04Z",
"pushed_at": "2024-07-05T19:45:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2024-07-04T14:06:41Z",
"updated_at": "2024-07-06T07:57:37Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 146,
"watchers": 147,
"score": 0,
"subscribers_count": 17
}

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2024-07-04T14:06:41Z",
"updated_at": "2024-07-06T07:57:37Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 146,
"watchers": 147,
"score": 0,
"subscribers_count": 17
}

View file

@ -13,10 +13,10 @@
"description": "Simple Serv-U CVE-2021-35211 PoC",
"fork": false,
"created_at": "2021-09-30T01:45:42Z",
"updated_at": "2024-03-05T16:34:39Z",
"updated_at": "2024-07-06T08:22:29Z",
"pushed_at": "2021-09-30T01:46:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2022-01-14T05:52:17Z",
"updated_at": "2024-01-30T07:26:22Z",
"updated_at": "2024-07-06T08:22:27Z",
"pushed_at": "2022-01-14T05:56:09Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 4
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 1

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-07-05T21:14:09Z",
"updated_at": "2024-07-06T09:30:06Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1772,
"watchers_count": 1772,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 523,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 523,
"watchers": 1772,
"watchers": 1773,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2639 Linux kernel openvswitch local privilege escalation",
"fork": false,
"created_at": "2022-09-05T15:31:56Z",
"updated_at": "2024-03-05T12:27:27Z",
"updated_at": "2024-07-06T10:53:06Z",
"pushed_at": "2022-09-05T14:25:17Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 105,
"watchers": 106,
"score": 0,
"subscribers_count": 2
},

View file

@ -365,10 +365,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-03T06:09:30Z",
"updated_at": "2024-06-26T10:00:48Z",
"updated_at": "2024-07-06T12:16:37Z",
"pushed_at": "2024-02-03T06:10:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -377,7 +377,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},

View file

@ -174,13 +174,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -108,13 +108,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
"fork": false,
"created_at": "2024-05-20T03:29:09Z",
"updated_at": "2024-06-16T08:49:12Z",
"updated_at": "2024-07-06T08:44:33Z",
"pushed_at": "2024-05-21T10:30:49Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 267,
"watchers_count": 267,
"has_discussions": false,
"forks_count": 56,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 56,
"forks": 57,
"watchers": 267,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.",
"fork": false,
"created_at": "2024-06-19T01:46:33Z",
"updated_at": "2024-07-04T13:49:49Z",
"updated_at": "2024-07-06T08:20:26Z",
"pushed_at": "2024-06-19T01:52:05Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2024-28955 Exploitation PoC ",
"fork": false,
"created_at": "2024-07-01T11:49:51Z",
"updated_at": "2024-07-04T14:03:39Z",
"updated_at": "2024-07-06T07:24:46Z",
"pushed_at": "2024-07-01T12:53:21Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -244,7 +244,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,19 +73,19 @@
"description": "该漏洞存在于 NtQueryInformationToken 函数中特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
"fork": false,
"created_at": "2024-07-05T16:02:56Z",
"updated_at": "2024-07-06T06:13:40Z",
"updated_at": "2024-07-06T09:27:41Z",
"pushed_at": "2024-07-05T16:06:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -235,10 +235,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-06-24T15:18:32Z",
"updated_at": "2024-07-06T08:39:58Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 2
},

View file

@ -163,10 +163,10 @@
"description": "CosmicSting (CVE-2024-34102)",
"fork": false,
"created_at": "2024-06-28T23:33:21Z",
"updated_at": "2024-07-05T16:26:37Z",
"updated_at": "2024-07-06T06:58:14Z",
"pushed_at": "2024-06-28T23:34:43Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
@ -318,13 +318,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.",
"fork": false,
"created_at": "2024-07-04T13:19:47Z",
"updated_at": "2024-07-06T03:38:20Z",
"updated_at": "2024-07-06T10:15:46Z",
"pushed_at": "2024-07-04T19:18:04Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 19,
"forks": 7,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -103,10 +103,10 @@
"description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit",
"fork": false,
"created_at": "2024-07-06T01:10:28Z",
"updated_at": "2024-07-06T04:48:36Z",
"updated_at": "2024-07-06T12:06:14Z",
"pushed_at": "2024-07-06T01:57:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-07-06T06:19:12Z",
"updated_at": "2024-07-06T12:29:42Z",
"pushed_at": "2024-07-06T01:25:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"forks": 4,
"watchers": 17,
"score": 0,
"subscribers_count": 0
},
@ -43,10 +43,10 @@
"description": "Path Traversal On The \"\/Modules\/Messaging\/\" Endpoint In Splunk Enterprise On Windows",
"fork": false,
"created_at": "2024-07-06T01:00:57Z",
"updated_at": "2024-07-06T02:14:49Z",
"updated_at": "2024-07-06T10:40:19Z",
"pushed_at": "2024-07-06T01:07:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 22,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -13,18 +13,18 @@
"description": "CVE-2024-39844 (ZNC < 1.9.1 modtcl RCE)",
"fork": false,
"created_at": "2024-07-03T23:27:25Z",
"updated_at": "2024-07-04T01:20:25Z",
"updated_at": "2024-07-06T10:04:41Z",
"pushed_at": "2024-07-03T23:30:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).",
"fork": false,
"created_at": "2024-07-05T06:46:34Z",
"updated_at": "2024-07-05T15:51:50Z",
"pushed_at": "2024-07-05T06:51:54Z",
"stargazers_count": 6,
"watchers_count": 6,
"updated_at": "2024-07-06T12:26:50Z",
"pushed_at": "2024-07-06T12:26:42Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -184,13 +184,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -56,10 +56,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-07-05T19:08:04Z",
"updated_at": "2024-07-06T10:38:32Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 398,
"watchers_count": 398,
"stargazers_count": 399,
"watchers_count": 399,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -68,7 +68,7 @@
"topics": [],
"visibility": "public",
"forks": 178,
"watchers": 398,
"watchers": 399,
"score": 0,
"subscribers_count": 5
},
@ -116,10 +116,10 @@
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:26:40Z",
"updated_at": "2024-07-05T13:54:38Z",
"updated_at": "2024-07-06T07:53:00Z",
"pushed_at": "2024-07-01T14:16:36Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 3
},
@ -303,10 +303,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-06T06:30:18Z",
"pushed_at": "2024-07-05T11:14:02Z",
"stargazers_count": 329,
"watchers_count": 329,
"updated_at": "2024-07-06T11:06:39Z",
"pushed_at": "2024-07-06T07:57:02Z",
"stargazers_count": 334,
"watchers_count": 334,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -321,7 +321,7 @@
],
"visibility": "public",
"forks": 70,
"watchers": 329,
"watchers": 334,
"score": 0,
"subscribers_count": 4
},
@ -339,19 +339,25 @@
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
"updated_at": "2024-07-06T01:03:51Z",
"pushed_at": "2024-07-02T10:55:06Z",
"stargazers_count": 20,
"watchers_count": 20,
"updated_at": "2024-07-06T10:48:32Z",
"pushed_at": "2024-07-06T10:47:30Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"openssh",
"security-audit",
"security-tools",
"ssh",
"ssh-server"
],
"visibility": "public",
"forks": 1,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -699,10 +705,10 @@
"description": "CVE-2024-6387 exploit",
"fork": false,
"created_at": "2024-07-02T04:09:44Z",
"updated_at": "2024-07-05T02:31:25Z",
"updated_at": "2024-07-06T07:36:45Z",
"pushed_at": "2024-07-02T04:45:15Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -711,7 +717,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
@ -789,19 +795,19 @@
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
"updated_at": "2024-07-04T20:49:18Z",
"updated_at": "2024-07-06T07:45:41Z",
"pushed_at": "2024-07-04T20:04:30Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
@ -1129,10 +1135,10 @@
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
"fork": false,
"created_at": "2024-07-02T11:55:39Z",
"updated_at": "2024-07-03T14:18:14Z",
"updated_at": "2024-07-06T08:55:20Z",
"pushed_at": "2024-07-02T23:32:12Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1154,7 +1160,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
@ -1957,7 +1963,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1965,7 +1971,7 @@
"cve-2024-6387-checker"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -2079,7 +2085,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -2095,7 +2101,7 @@
"sshd"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -2119,13 +2125,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -2144,19 +2150,25 @@
"description": "HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).",
"fork": false,
"created_at": "2024-07-05T02:46:57Z",
"updated_at": "2024-07-05T15:29:53Z",
"updated_at": "2024-07-06T11:05:52Z",
"pushed_at": "2024-07-05T03:40:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2024-6387",
"fingerprint",
"hassh",
"regresshion",
"ssh"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -34943,7 +34943,6 @@
- [faiqu3/cve-2018-6574](https://github.com/faiqu3/cve-2018-6574)
- [Dannners/CVE-2018-6574-go-get-RCE](https://github.com/Dannners/CVE-2018-6574-go-get-RCE)
- [bme2003/CVE-2018-6574](https://github.com/bme2003/CVE-2018-6574)
- [athulmur/CVE-2018-6574](https://github.com/athulmur/CVE-2018-6574)
### CVE-2018-6622 (2018-08-17)